COMPARATIVE STUDY OF THE IMPACT OF DOS ATTACKS ON LANS USING VLANS

Authors

  • Omran Ali Bentaher Higher institute of technology and science, Zliten, Libya
  • Hadya Hawedi Faculty of Information Technology, Alasmarya Islamic University Zliten, Libya
  • Kaled Abodhir Faculty of Science, Alasmarya Islamic University, Zliten, Libya

DOI:

https://doi.org/10.59743/aujas.v5i1.1645

Keywords:

VLAN, DoS, Broadcast, LAN, Trunk

Abstract

The separation of critical services from noncritical services can occur  on  layer  two  broadcast  domain.  Separation  could  involve  the  isolation  of  broadcast  or  collision  domains  through  Virtual  Local  Area  Networks  VLANs.  This  helps  reduce  the  risk  of  Address  Resolution Protocol ARP storms during heavy scanning events or  denial of service attacks DoS. The major threat on the network is DoS  attacks which use the broadcast storm flooding as TCP syn flood to  engage the servers. This paper demonstrate how VLANs could be  used  to  reduce  the  impact  of  DoS  attacks  on  the  servers.  The  simulation  was  carried  out  using  Cisco  Packet  Tracer  6.0.1.  Two  scenarios were presented, first one showed flooding the server before  VLANs  and  second  scenario  showed  how  VLANs  could  reduce  flooding  the  servers  so  using  VLANs  reduce  the  impact  of  DoS  attacks as mentioned in scenario two. 

References

A. Hameed and A. N. Mian, “Finding efficient VLAN topology for better broadcast containment,” in 2012 Third International Conference on The Network of the Future (NOF), 2012, pp. 1–6. DOI: https://doi.org/10.1109/NOF.2012.6464001

V. Pavani, I. L. Chandrika, and A. R. Krishna, “Local Area Network (LAN) Technologies,” Int. J. Innov. Technol. Explor. Eng. IJITEE Vol., vol. 1.

COMPARATIVE STUDY OF THE IMPACT OF DOS ATTACKS ON LANS USING VLANS

I. A. Alimi and A. O. Mufutau, “Enhancement of network performance of an enterprises network with VLAN,” Am. J. Mob. Syst. Appl. Serv., vol. 1, no. 2, pp. 82–93, 2015.

A. C. Odi, N. E. Nwogbaga, and N. O. Chukwuka, “The Proposed Roles of VLAN and Inter-VLAN Routing in Effective Distribution of Network Services in Ebonyi State University,” Int. J. Sci. Res., no. 7, pp. 2608–2615, 2015.

H. S. Hawedi, O. A. Bentaher, and K. E. Abodhir, “Using Access Control List against Denial of service attacks.”

A. M. H. Nur, “Performance Analysis of LAN and VLAN Using Soft Computing Techniques,” IOSR J. Electron. Commun. Eng., vol. 9, no. 6, pp. 10–16, 2014. DOI: https://doi.org/10.9790/2834-09641016

M. Baykara and R. DAŞ, “SoftSwitch: a centralized honeypot- based security approach using software-defined switching for secure management of VLAN networks,” Turk. J. Electr. Eng. Comput. Sci., vol. 27, no. 5, pp. 3309–3325, 2019. DOI: https://doi.org/10.3906/elk-1812-86

S. Vidya and R. Bhaskaran, “ARP storm detection and prevention measures,” Int. J. Comput. Sci. Issues IJCSI, vol. 8, no. 2, p. 456, 2011.

M. B. Lehocine and M. Batouche, “Flexibility of managing VLAN filtering and segmentation in SDN networks,” in 2017 International Symposium on Networks, Computers and Communications (ISNCC), 2017, pp. 1–6. DOI: https://doi.org/10.1109/ISNCC.2017.8071999

M. S. Islam, M. J. Hossain, and M. H. Kabir, “Virtualization of Campus LAN and analyzing traffic issues of these VLANs,” Int. J. Sci. Eng. Res., vol. 5, no. 1, 2014.

V.-G. Nguyen and Y.-H. Kim, “SDN-Based Enterprise and Campus Networks: A Case of VLAN Management.,” J. Inf. Process. Syst., vol. 12, no. 3, 2016.

Omran Ali Bentaher ،Hadya S. Hawedi ،Kaled E. I. Abodhir

S. E. Ul Haq and S. Parveen, “IMPLEMENTATION OF NETWORK ARCHITECTURE, ITS SECURITY AND PERFORMANCE ANALYSIS OF VLAN.,” Int. J. Adv. Res. Comput. Sci., vol. 8, no. 7, 2017. DOI: https://doi.org/10.26483/ijarcs.v8i7.3247

A. Mehdizadeha, K. Suinggia, M. Mohammadpoorb, and H. Haruna, “Virtual Local Area Network (VLAN): Segmentation and Security,” in The Third International Conference on Computing Technology and Information Management (ICCTIM2017), 2017, pp. 78– 89.

M. Yu, J. Rexford, X. Sun, S. Rao, and N. Feamster, “A survey of virtual LAN usage in campus networks,” IEEE Commun. Mag., vol. 49, no. 7, pp. 98–103, 2011. DOI: https://doi.org/10.1109/MCOM.2011.5936161

D. A. Aziz, “The Importance of VLANs and Trunk Links in Network Communication Areas.”

E. A. Blake, “Network security: VoIP security on data network--a guide,” in Proceedings of the 4th annual conference on Information security curriculum development, 2007, pp. 1–7. DOI: https://doi.org/10.1145/1409908.1409938

N. H. Prasad, B. K. Reddy, B. Amarnath, and M. Puthanial, “Intervlan Routing and Various Configurations on Vlan in a Network using Cisco Packet Tracer,” Int. J. Innov. Res. Sci. Technol., vol. 2, no. 11, pp. 749–758, 2016.

S. A. Rouiller, “Virtual LAN Security: weaknesses and countermeasures,” Available Uploads Askapache Com200612vlan-Secur.- 3 Pdf, 2003.

R. O. Verma and S. S. Shriramwar, “Security Optimization of VTP Model in an Enterprise VLAN,” IJECCE, vol. 4, no. 3, pp. 950–954, 2013.

D. J. Jingle and E. B. Rajsingh, “Defending IP spoofing attack and TCP SYN flooding attack in next generation multi-hop wireless networks,” Int. J. Inf. Netw. Secur., vol. 2, no. 2, p. 160, 2013. DOI: https://doi.org/10.11591/ijins.v2i2.1768

Prabhakaran Abraham Ali Ahmad Milad and Mustafa Almahdi Algaet, “Performance and Efficient allocation of Virtual Internet Protocol addressing in Next Generation Network Environment,” Aust. J. Basic Appl.

COMPARATIVE STUDY OF THE IMPACT OF DOS ATTACKS ON LANS USING VLANS

Sci., vol. 7(7), no. 827–832, pp. 827–832, 2013, [Online]. Available: http://ajbasweb.com/old/ajbas/2013/may/827-832.pdf.

Downloads

Published

2020-06-30

How to Cite

Bentaher, O. A., Hawedi, H., & Abodhir, K. (2020). COMPARATIVE STUDY OF THE IMPACT OF DOS ATTACKS ON LANS USING VLANS . Journal of Alasmarya University, 5(1), 88–105. https://doi.org/10.59743/aujas.v5i1.1645