A Survey of Ethernet LAN Security
Ethernet is the survivor of the LAN wars. It is hard to find an IP packet that has not passed over an Ethernet segment. One important reason for this is Ethernet's simplicity and ease of configuration. However, Ethernet has always been known to be an insecure technology. Recent successful malwa...
Saved in:
Published in | IEEE Communications surveys and tutorials Vol. 15; no. 3; pp. 1477 - 1491 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
IEEE
01.01.2013
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Ethernet is the survivor of the LAN wars. It is hard to find an IP packet that has not passed over an Ethernet segment. One important reason for this is Ethernet's simplicity and ease of configuration. However, Ethernet has always been known to be an insecure technology. Recent successful malware attacks and the move towards cloud computing in data centers demand that attention be paid to the security aspects of Ethernet. In this paper, we present known Ethernet related threats and discuss existing solutions from business, hacker, and academic communities. Major issues, like insecurities related to Address Resolution Protocol and to self-configurability, are discussed. The solutions fall roughly into three categories: accepting Ethernet's insecurity and circling it with firewalls; creating a logical separation between the switches and end hosts; and centralized cryptography based schemes. However, none of the above provides the perfect combination of simplicity and security befitting Ethernet. |
---|---|
AbstractList | Ethernet is the survivor of the LAN wars. It is hard to find an IP packet that has not passed over an Ethernet segment. One important reason for this is Ethernet's simplicity and ease of configuration. However, Ethernet has always been known to be an insecure technology. Recent successful malware attacks and the move towards cloud computing in data centers demand that attention be paid to the security aspects of Ethernet. In this paper, we present known Ethernet related threats and discuss existing solutions from business, hacker, and academic communities. Major issues, like insecurities related to Address Resolution Protocol and to self-configurability, are discussed. The solutions fall roughly into three categories: accepting Ethernet's insecurity and circling it with firewalls; creating a logical separation between the switches and end hosts; and centralized cryptography based schemes. However, none of the above provides the perfect combination of simplicity and security befitting Ethernet. |
Author | Sarela, Mikko Manner, Jukka Kiravuo, Timo |
Author_xml | – sequence: 1 givenname: Timo surname: Kiravuo fullname: Kiravuo, Timo organization: Dept. of Commun. & Networking, Aalto Univ., Aalto, Finland – sequence: 2 givenname: Mikko surname: Sarela fullname: Sarela, Mikko organization: Dept. of Commun. & Networking, Aalto Univ., Aalto, Finland – sequence: 3 givenname: Jukka surname: Manner fullname: Manner, Jukka organization: Dept. of Commun. & Networking, Aalto Univ., Aalto, Finland |
BookMark | eNotzs1Kw0AUQOFBFGyrTyBIfICk987_LEOpVQgVjBV3ZTK5gxFNZZIKeXsLuvp2hzNn5_2hJ8ZuEQpEcMt69_xacEBeIEc8AYAOztgMlRK5Nebtks2H4QNAculgxu7KrD6mH5qyQ8zW4zulnsasKrdZTeGYunG6YhfRfw50_e-C7e7XL6uHvHraPK7KKg9C6DGPFLhvG2e1sw6jkVG4qBoCQxaDbC34IFoVjPbUGOXIIA-nUQUtGi-sWLCbv25HRPvv1H35NO21BCOVFr-3qT16 |
CitedBy_id | crossref_primary_10_1142_S0218126618500822 crossref_primary_10_3390_en11092360 crossref_primary_10_1016_j_vehcom_2019_100214 crossref_primary_10_3390_s22176679 crossref_primary_10_1109_COMST_2016_2521642 crossref_primary_10_1109_COMST_2023_3309864 crossref_primary_10_3934_mbe_2023761 crossref_primary_10_4236_jcc_2016_44006 crossref_primary_10_1016_j_jnca_2014_09_003 crossref_primary_10_1145_3139294 crossref_primary_10_1155_2018_4127487 crossref_primary_10_1109_JIOT_2020_3034350 crossref_primary_10_1145_3278120 crossref_primary_10_1016_j_jisa_2019_04_003 crossref_primary_10_1109_TFUZZ_2023_3262686 crossref_primary_10_1007_s41635_020_00107_9 crossref_primary_10_1145_3586007 crossref_primary_10_1145_3417988 crossref_primary_10_1145_3301305 crossref_primary_10_1016_j_comcom_2021_08_027 crossref_primary_10_1109_COMST_2017_2689819 crossref_primary_10_1016_j_segan_2023_101167 crossref_primary_10_16984_saufenbilder_506554 crossref_primary_10_3390_s23041747 crossref_primary_10_1109_COMST_2018_2839348 crossref_primary_10_1016_j_micpro_2020_103198 crossref_primary_10_1016_j_vehcom_2023_100639 |
ContentType | Journal Article |
DBID | 97E ESBDL RIA RIE |
DOI | 10.1109/SURV.2012.121112.00190 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005-present IEEE Xplore Open Access Journals IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library Online url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1553-877X |
EndPage | 1491 |
ExternalDocumentID | 6407456 |
Genre | orig-research |
GroupedDBID | 0R~ 29I 2WC 4.4 5GY 5VS 6IK 97E AAJGR AASAJ ABQJQ ABVLG ACGFO ACIWK AENEX AETIX AIBXA AKJIK ALLEH ALMA_UNASSIGNED_HOLDINGS ATWAV AZLTO BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 EBS EJD ESBDL HZ~ IES IFIPE IFJZH IPLJI JAVBF LAI O9- OCL P2P RIA RIE RIG RNS |
ID | FETCH-LOGICAL-c336t-fec2adb9869891f74f39f5be07e81c4d80ac3d5c76aeb759e712c01250d17a383 |
IEDL.DBID | RIE |
IngestDate | Wed Jun 26 19:28:55 EDT 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 3 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c336t-fec2adb9869891f74f39f5be07e81c4d80ac3d5c76aeb759e712c01250d17a383 |
OpenAccessLink | https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/document/6407456 |
PageCount | 15 |
ParticipantIDs | ieee_primary_6407456 |
PublicationCentury | 2000 |
PublicationDate | 2013-01-01 |
PublicationDateYYYYMMDD | 2013-01-01 |
PublicationDate_xml | – month: 01 year: 2013 text: 2013-01-01 day: 01 |
PublicationDecade | 2010 |
PublicationTitle | IEEE Communications surveys and tutorials |
PublicationTitleAbbrev | COMST |
PublicationYear | 2013 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0042490 |
Score | 2.3573282 |
Snippet | Ethernet is the survivor of the LAN wars. It is hard to find an IP packet that has not passed over an Ethernet segment. One important reason for this is... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1477 |
SubjectTerms | Data security Ethernet networks IP networks Local area networks Ports (Computers) Routing protocols Security Switches |
Title | A Survey of Ethernet LAN Security |
URI | https://ieeexplore.ieee.org/document/6407456 |
Volume | 15 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEB7anvTgq4pvInh0231kN8mxSEsR24O10lvJY3IRtqXsCvrrTXa3ouLBW8glmUySec8HcCslIveXF0USBlQbE3A0MjAZlyipUNJ4h_5kmo3n9GGRLlpw91ULg4hV8hn2_LCK5ZuVLr2rrO-DTk7gt6HNhKhrtba_LnVmRNhUAEeh6M_mTy8-cSv27RMi7_DzRdM_IFQqCTLah8l27Tpx5LVXFqqnP361Zfzv5g5gr1ElyaDm_SG0MD-C3W8NBrtwMyCzcvOG72RlydDrejkW5HEwJbMGt-4Y5qPh8_04aEARAp0kWRFY1LE0SnCP_BhZRm0ibKowZMgjTQ0PpU5MqlkmUbFUIIti7c4hDU3EpLNHT6CTr3I8BaLRiX-UPvlFUmo5lzxKTSy0dK9SGXsGXU_mcl33vVg2FJ7_PX0BO3EFFeHdE5fQKTYlXjmBXajrilOfPvuUsw |
link.rule.ids | 315,783,787,799,27936,27937,55086 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED6VMgADr4J4YyRGUuLESZyxQq0KtB1oi7pVfpwXpBRVCRL8euwkRYAY2Cwv9vls3_s-gGshELm7vJiGvseU1h5HLTwdc4GCpVJo59AfjuL-lD3MolkDbr5qYRCxTD7DthuWsXy9UIVzld26oJMV-GuwbvVqHlfVWqt_l1lDwq9rgKmf3o6nT88udStwDRSoc_m5sukfICqlDOntwHC1epU68tIuctlWH78aM_53e7uwXSuTpFNxfw8amO3D1rcWgy246pBxsXzDd7IwpOu0vQxzMuiMyLhGrjuAaa87uet7NSyCp8Iwzj2DKhBaptxhP1KTMBOmJpLoJ8ipYpr7QoU6UkksUCZRigkNlD2HyNc0EdYiPYRmtsjwCIhCqwCgcOkvgjHDueA00kGqhH2XUptjaDky569V54t5TeHJ39OXsNGfDAfzwf3o8RQ2gxI4wjkrzqCZLws8t-I7lxcl1z4BPVqX_g |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Survey+of+Ethernet+LAN+Security&rft.jtitle=IEEE+Communications+surveys+and+tutorials&rft.au=Kiravuo%2C+Timo&rft.au=Sarela%2C+Mikko&rft.au=Manner%2C+Jukka&rft.date=2013-01-01&rft.pub=IEEE&rft.eissn=1553-877X&rft.volume=15&rft.issue=3&rft.spage=1477&rft.epage=1491&rft_id=info:doi/10.1109%2FSURV.2012.121112.00190&rft.externalDocID=6407456 |