Detection and Prevention of Bypassing Attack on VLAN-Based Network Segmentation Environment
![]() |
Kim, Kwang-jun
(Hannam University)
Hwang, Kyu-ho (National Security Research Institute) Kim, In-kyoung (National Security Research Institute) Oh, Hyung-geun (National Security Research Institute) Lee, Man-hee (Hannam University) |
1 | Hong-soon Shin and Sun-cheol Hwang, "Result of the survey about an intrusion on personal information in Interpark," Ministry of Science, ICT, Future Planning and Korea Communications Commission, pp. 1-3, Aug. 2016. |
2 | Dong-cheol Kang, "Interpark leaked customer information… 'Internet network separation' was insufficient," Chosunbiz, pp. 1, July. 2016. |
3 | Steve A. Rouiller, "Virtual LAN Security weaknesses and countermeasures,", SANS Institute, pp. 8-9, Dec. 2006. |
4 | Yusuf Bhaiji, "Layer 2 Attacks & Mitigation Techniques," Cisco Systems, pp. 21-26, Aug. 2006. |
5 | Hyun-Jin Oh and Jae-Oh Moon, "Analysis and Prevention of network at- tacks that target weakness in Data link layer," University of Dongseo, pp. 12, Dec. 2011. |
6 | Yusuf Bhaiji, "Understanding, Preventing, and Defending Against Layer 2 Attacks," Cisco Systems, pp. 15, 2009. |
7 | CISCO, "Inter-Switch Link and IEEE 802.1Q Frame Format," Document ID 17056, pp. 5-6, Aug. 2006. |
8 | IEEE Computer Society, "IEEE Standard for Local and Metropolitan Area Networks---Virtual Bridged Local Area Networks," ISBN 978-0-7381-4877-9, pp. 74-78, May. 2006. |
9 | Google, "VLAN's," https://sites.google.com/site/nikiccnawiki/swithes/vlans |
10 | Isiaka A. Alimi and Akeem O. Mufutau, "Enhancement of Network Performance of an Enterprises Network with VLAN," American Journal of Mobile Systems, Applications and Services, vol. 1, no. 2, pp. 82-93, July. 2015. |
![]() |