A Survey of Ethernet LAN Security

被引:46
|
作者
Kiravuo, Timo [1 ]
Sarela, Mikko [1 ]
Manner, Jukka [1 ,2 ]
机构
[1] Aalto Univ, Dept Commun & Networking, Helsinki, Finland
[2] Aalto Univ, Dept Commun & Networking Comnet, Helsinki, Finland
来源
关键词
Ethernet networks; Security; Data security; SYSTEM;
D O I
10.1109/SURV.2012.121112.00190
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ethernet is the survivor of the LAN wars. It is hard to find an IP packet that has not passed over an Ethernet segment. One important reason for this is Ethernet's simplicity and ease of configuration. However, Ethernet has always been known to be an insecure technology. Recent successful malware attacks and the move towards cloud computing in data centers demand that attention be paid to the security aspects of Ethernet. In this paper, we present known Ethernet related threats and discuss existing solutions from business, hacker, and academic communities. Major issues, like insecurities related to Address Resolution Protocol and to self-configurability, are discussed. The solutions fall roughly into three categories: accepting Ethernet's insecurity and circling it with firewalls; creating a logical separation between the switches and end hosts; and centralized cryptography based schemes. However, none of the above provides the perfect combination of simplicity and security befitting Ethernet.
引用
收藏
页码:1477 / 1491
页数:15
相关论文
共 50 条
  • [31] Gigabit Ethernet for Stacking LAN's Networks Performance Correction
    Fernandes, Cindy S.
    Tavares, Marcia C. O.
    Polen, Priscila R.
    Filho, Emilio J. M. A.
    [J]. 2006 THE JOINT INTERNATIONAL CONFERENCE ON OPTICAL INTERNET (COIN) AND NEXT GENERATION NETWORK (NGNCON), 2006, : 658 - 662
  • [32] Broadband wireless infrared LAN architecture compatible with Ethernet protocol
    Jungnickel, V
    Helmolt, CV
    Krüger, U
    [J]. ELECTRONICS LETTERS, 1998, 34 (25) : 2371 - 2372
  • [33] Studies for realizing Soft TCCS residing on top of Ethernet LAN
    Nakano, N
    Ando, T
    Sato, F
    Mizuno, T
    [J]. 1996 INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, PROCEEDINGS, 1996, : 141 - 148
  • [34] An application of a protective relaying scheme over an Ethernet LAN/WAN
    Brunello, G
    Smith, R
    Campbell, CB
    [J]. 2001 IEEE/PES TRANSMISSION AND DISTRIBUTION CONFERENCE AND EXPOSITION, VOLS 1 AND 2: DEVELOPING NEW PERSPECTIVES, 2001, : 522 - 526
  • [35] The triumph of ethernet: Technological communities and the battle for the LAN standard.
    Downey, G
    [J]. BUSINESS HISTORY REVIEW, 2002, 76 (03) : 617 - 620
  • [36] WireLan:: A broadband wireless IR LAN architecture compatible with the ethernet protocol
    Jungnickel, V
    von Helmolt, C
    Krüger, U
    [J]. 24TH EUROPEAN CONFERENCE ON OPTICAL COMMUNICATION, VOL 1-3: VOL 1: REGULAR AND INVITED PAPERS; VOL 2: TUTORIALS AND SYMPOSIUM PAPERS; VOL 3: POSTDEADLINE PAPERS, 1998, : 367 - 368
  • [37] NETWORK SECURITY - IS YOUR LAN A SIEVE
    APPLETON, EL
    [J]. DATAMATION, 1993, 39 (17): : 79 - 80
  • [38] A performance evaluation of emerging Ethernet technologies: Switched/high-speed/full-duplex Ethernet and Ethernet LAN emulation over ATM
    Rindos, A
    Woolet, S
    Nicholson, L
    Vouk, M
    [J]. PROCEEDINGS OF THE IEEE SOUTHEASTCON '96: BRINGING TOGETHER EDUCATION, SCIENCE AND TECHNOLOGY, 1996, : 401 - 404
  • [39] The design of key security in ethernet PON
    Eun, JS
    Kwon, Y
    [J]. 8th International Conference on Advanced Communication Technology, Vols 1-3: TOWARD THE ERA OF UBIQUITOUS NETWORKS AND SOCIETIES, 2006, : U1026 - U1030
  • [40] BUTTON UP YOUR LAN SECURITY
    LINDHOLM, E
    [J]. DATAMATION, 1994, 40 (03): : 59 - 60