A survey on backbone attack
dc.contributor.author | Güven, Ebu Yusuf | |
dc.contributor.author | Ya?cı, Mehmet Yavuz | |
dc.contributor.author | Boyacı, Ali | |
dc.contributor.author | Yarkan, Serkan | |
dc.contributor.author | Aydın, Muhammed Ali | |
dc.date.accessioned | 2020-11-21T15:56:11Z | |
dc.date.available | 2020-11-21T15:56:11Z | |
dc.date.issued | 2019 | en_US |
dc.department | İstanbul Ticaret Üniversitesi | en_US |
dc.description | 7th International Symposium on Digital Forensics and Security, ISDFS 2019 -- 10 June 2019 through 12 June 2019 -- -- 149395 | en_US |
dc.description.abstract | The Internet is the universal network infrastructure that surrounds the Earth with thousands of devices and connections that make up it. The communication of various technologies from data centers to personal smartphones is provided through this infrastructure. While end devices are renewed as technology and product in short periods, network devices such as switches and routers, where communication is provided, can work for many years and work with out-of-date software and protocols. Therefore, it is clear how important the weaknesses are. Internet communication protocols are designed with security concerns in mind instead of communication speed and bandwidth. Even though researchers work intensively on wireless networks, the security of the infrastructure that connects wireless networks is ignored. In this study, we examined the attacks on OSI layer 2 and layer 3 layers made to the devices that constitute the backbone of the Internet infrastructure. Although several security measures and updates have been published for some of these attacks, the vulnerabilities that may occur in outdated devices are revealed. © 2019 IEEE. | en_US |
dc.description.sponsorship | Istanbul Kalkinma Ajansi -- This publication was carried out in Internet of Things Security and Evaluation Center (ISTEC) and Istanbul Digital Forensics Laboratory (IDFL) sponsored by the Istanbul Development Agency. -- -- IEEE Society | en_US |
dc.identifier.doi | 10.1109/ISDFS.2019.8757546 | en_US |
dc.identifier.isbn | 9781730000000 | |
dc.identifier.scopus | 2-s2.0-85070488244 | en_US |
dc.identifier.scopusquality | N/A | en_US |
dc.identifier.uri | https://doi.org/10.1109/ISDFS.2019.8757546 | |
dc.identifier.uri | https://hdl.handle.net/11467/4101 | |
dc.identifier.wos | WOS:000490864900049 | en_US |
dc.identifier.wosquality | N/A | en_US |
dc.indekslendigikaynak | Web of Science | en_US |
dc.indekslendigikaynak | Scopus | en_US |
dc.language.iso | en | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.relation.ispartof | 7th International Symposium on Digital Forensics and Security, ISDFS 2019 | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Cyber attack | en_US |
dc.subject | Datalink layer attack | en_US |
dc.subject | Layer 2 | en_US |
dc.subject | Router | en_US |
dc.subject | Switch | en_US |
dc.title | A survey on backbone attack | en_US |
dc.type | Conference Object | en_US |