Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

This is an Open Access publication published under CSC-OpenAccess Policy.
Publications from CSC-OpenAccess Library are being accessed from over 74 countries worldwide.
Enhance the Security and Performance of IP over Ethernet Networks by Reduction the Naming System Design
Waleed Khalid Hussein, Longzheng Cai, Shaymaa A. Alyawer
Pages - 177 - 194     |    Revised - 15-11-2012     |    Published - 31-12-2012
Volume - 4   Issue - 5    |    Publication Date - December 2012  Table of Contents
IP protocol, MAC address, Ethernet, ARP protocol, Security, Performance
In this research, we investigate the weak link between two protocols, IP protocol and Ethernet protocol. IP over Ethernet network has become the major network used by Internet. In this network, still the data link layer performance and security problems not adequately addressed yet. The findings of this research lead us to propose a modification, by making a reduction on current naming architecture to improve the network performance and security. The proposed architecture will be evaluated by a theoretical analysis.
CITED BY (2)  
1 Alzubaidi, W. K., Cai, L., Alyawer, S. A., & Siebert-Cole, E. (2015). Visibility for Network Security Enhancement in Internet Protocol Over Ethernet Networks. In Advanced Computer and Communication Engineering Technology (pp. 277-287). Springer International Publishing.
2 Alzubaidi, W. K., Cai, L., & Alyawer, S. A. (2014, June). Enhance the performance of ICMP protocol by reduction the IP over ethernet naming architecture. In Computer and Information Sciences (ICCOINS), 2014 International Conference on (pp. 1-6). IEEE.
1 Google Scholar 
2 CiteSeerX 
3 Scribd 
4 SlideShare 
5 PdfSR 
1 Craig A. Shue, Minaxi Gupta, An Internet without the Internet protocol, Computer Networks 2010 54 (2010) 3232–3245, http://dx.doi.org/10.1016/j.comnet.2010.06.009.
2 NathNayak, G., GhoshSamaddar, S., “Different Flavours of Man-In-The-Middle Attack,Consequences and Feasible Solutions”, Computer Science and Information Technology(ICCSIT), 2010 3rd IEEE International Conference.
3 S.J. Prowell, R. Kraus, and M. Borkin, “Seven Deadliest Network Attacks”, Syngress, 2010.
4 Bashir, M. S., “ARP Cache Poisoning with Ettercap" August 2003Available at http://www.giac.org/practical/GSEC/Mohammad Bashir GSEC.pdf.
5 S.Vidya, R.Bhaskaran, “A Subnet Based Intrusion Detection Scheme for Tracking down the Origin of Man-In-The-Middle Attack”, IJCSI International Journal of Computer Science Issues,Vol.8, Issue 5, September 2011, ISSN(Online): 1694-0814, pp-173-179.
6 S.Vidya, N.Gowri, R.Bhaskaran, “ARP traffic and Network Vulnerability”, in proceedings of INDIACOM-2011, conducted by BVICAM, New Delhi, India, page – 619 and in CD.
7 Hayriye C. Altunbasak, “Layer 2 Security Inter-Layering In Networks,” Thesis dissertation,Georgia Institute of Technology, Dec. 2006.
8 Xiangning HOU, Zhiping JIANG and Xinli TIAN. The detection and prevention for ARP Spoofing based on Snort. In 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).
9 Behrouz A. Forouzan, “TCP/IP Protocol Suite”, Fourth Edition, Tata McGraw Hill, pp. 220-223, 2010.
10 Plummer, D. C., “Ethernet Address Resolution Protocol: Or converting network protocol addresses to 48.bit Ethernet address for transmission on Ethernet hardware." IETF RFC 826,November 1982.
11 C. Schluting. Configure your Catalyst for a more secure layer 2, Jan. 2005.http://www.enterprisenetworkingplanet.com/netsecur/article.php/3462211.
12 B.D.Schuymer.ebtables: Ethernet bridge tables,Mar.2006.http://ebtables.sourceforge.net.
13 W. Lootah, W. Enck, and P. McDaniel. TARP: Ticket-based address resolution protocol. In Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC ’05),Dec. 2005.
14 TJ O’Connor, “Detecting and Responding to Data Link Layer Attacks”, SANS Institute InfoSec Reading Room, Oct 13, 2010,http://www.sans.org/reading_room/whitepapers/detection/detecting-responding-data-linklayer-attacks_33513,2010.
15 802.1x-2004, http://www.ieee802.org/1/pages/802.1x-2004.html.
16 Sanjeev Kumar, Orifiel Gomez, “Denial of Service due to direct and Indirect ARP storm attacks in LAN environment”, Journal of Information Security, 2010, 1, pp. 88-94,doi:10.4236/jis.2010.12010 Published online October 2010 (http://www.SciRP.org/journal/jis).
17 Microsoft Windows 2008 TCP/IP Protocols and Services Technical Reference, Thomas Lee and Joseph Davies, Chapter 3: Adress Resolution Protocol (ARP).
18 C. Schluting. Configure your Catalyst for a more secure layer 2, Jan. 2005.http://www.enterprisenetworkingplanet.com/netsecur/article.php/3462211.
19 D. Bruschi, A. Ornaghi, and E. Rosti. S-ARP: A secure address resolution protocol. In Proceedings of the 19th AnnualComputer Security Applications Conference (ACSAC’03),Dec. 2003.
20 S. Whalen. An introduction to ARP spoofing.2600: The Hacker Quarterly, 18(3), Fall 2001 http://www.node99.org/projects/arpspoof/arpspoof.pdf.
21 Static ARP more dynamic than you might think on, http://www.chrismc.de, last access 15/8/2011.
22 T. Bradley, C. Brown, and A. Malis. “Inverse address resolution protocol”, Sept. 1998. RFC 2390.
23 Altunbasak, H., Krasser, S., Owen, H., Sokol, J., Grimminger, J.,andHuth, H.-P., “Addressing the weak link between Layer 2 and Layer 3 in the Internet architecture," in Proc. of the 29th Annual IEEE Conference on Local Computer Networks (LCN), (Tampa, Florida), November2004.
24 M. Barnaba. anticap. http://www.antifork.org/viewcvs/trunk/anticap, August/2011.
25 Cisco Systems. Configuring Dynamic ARP Inspection, chapter 39, pages 39:1–39:22. 2010.Catalyst 6500 Series Switch Cisco IOS Sofware Configuration Guide, Release 12.2SX.
Mr. Waleed Khalid Hussein
University of Tun Abdul Razak - Malaysia
Dr. Longzheng Cai
- Malaysia
Miss Shaymaa A. Alyawer
- Iraq