A New Verification Method to Prevent Security Threads of Unsolicited Message in IP Over Ethernet Networks

Internet is widely depends on the IP over Ethernet networks architecture. IP and Ethernet protocols uses in each Local Area Network LAN, wire and wireless. Due to the rapid expansion of the technology field this architecture reveals many shortcomings. TCP/IP suite protocols are consists from layers, each layer accomplish its jobs separately. However, these layers susceptible to different attacks. Data link layer one of the most layers targeted by the attackers. Attack at lower layer may lead to more sophisticated attacks to upper layers, like Man-in-The-Middle (MiTM), DNS spoofing and Denial of Service (DoS).

Provided by: AIRCC Topic: Networking Date Added: Nov 2012 Format: PDF

Find By Topic