Posted Date : 07th Mar, 2025
Peer-Reviewed Journals List: A Guide to Quality Research Publications ...
Posted Date : 07th Mar, 2025
Choosing the right journal is crucial for successful publication. Cons...
Posted Date : 27th Feb, 2025
Why Peer-Reviewed Journals Matter Quality Control: The peer revie...
Posted Date : 27th Feb, 2025
The Peer Review Process The peer review process typically follows sev...
Posted Date : 27th Feb, 2025
What Are Peer-Reviewed Journals? A peer-reviewed journal is a publica...
Analysis of the Layer 2 Attacks & Defence Mechanisms using GNS3 & Cisco Packet Tracer
Author Name : Mr. N. Sharath Babu , Mr. Pitcheri Praveen Kumar , Mr. R. Ramprakash
ABSTRACT Open System for Interconnection model was developed to allow different types of layers to work independently to send the information from source system to destination system in effective manner. The security mechanism is implemented from layer 3 to layer 7 in the OSI model architecture and the current firewall technology has a very limited scope on protecting the laye2 devices. Once the layer 2 devices are compromised then all remaining layer will be compromised easily. In order to protect the Laye 2 devices against the possible attacks a network engineer should have an in-depth knowledge on possible attacks and mitigation techniques. The objective of this paper is to perform the different types of possible attacks that can be happen in the layer 2 networks and mitigation techniques such as DHCP snooping attack, Telent Attacks, Mac-Flooding, Port Security, VLAN attack and Denial-of-Service (DoS) attacksare discussed in this paper with the help of Cisco Packet Tracer Simulator and GNS3 simulator.