Order for this Paper or Similar Assignment Writing Help

Click to fill the order details form in a few minute.

Posted: August 30th, 2022

Link Layer Protocol

Link Layer Protocol
What are the different attacks against the protocol? How do they work?
What are the vulnerabilities being exploited? How are these vulnerabilities being exploited?
What are the controls we can use to put in place to protect against the vulnerabilities? What does the network architecture look like? How will you protect against the vulnerabilities?

Create Table with following information (See Attachment)
Date

The format of the packet exchanged across the nodes is defined by the data link layer protocol. The protocols also perform actions like retransmission, random access, error detection and flow control. Some examples of the data link layer protocols include Ethernet, FDDI, PPP, token ring, ARP, ATM, frame relay and 802.1x. Different link-layer protocols handle datagram of different links in a path such as the Ethernet, which handles datagram on the first link and PPP on the second link. The Address Resolution Protocol is a communication protocol whose function is to discover the link-layer address. The 802.1x network authentication protocol opens ports for network access when a user identity is authenticated by an organization and authorizes network access.

Protocol Threats/Attacks Vulnerabilities Controls
ARP Spoofing – Address resolution Protocol poisoning refers to a certain type of attack involving sending ARP messages spoofed through a local area network.
Poisoning – this involves ARP cache poisoning and routing of ARP poison. The attacks try diverting Traffic from the host that is originally intended to an attacker.
Sniffing –
Session hijacking/MiM
Denial of service A loophole in the ARP protocol design mechanism that allows the host to receive an ARP request or packet response and fails to verify the packet authentication then replaces the ARP cache table in the original entry is a vulnerability.
Unsolicited ARP Reply is another type of vulnerability where a spoofed reply to an ARP request can be sent to any system. In contrast, the receiving system caches the reply by overwriting the existing entry or adding an entry. Some of the preventive measures that can be used are installing firewalls and session encryption, such as establishing VPNs between systems or networks to prevent disclosure attacks. The use of strong authentication is another measure. Examples are strong passwords and certificates to prevent disclosure attacks. Lastly, the use of hard coding addresses and port security.
802.1x Session Hijacking is the kind of attack where the attacker sends a fake packet to the wireless client
Man-in-the-Middle – the attacker acts as the legitimate access point where he views the Traffic passing through the wireless client and the legitimate access point.
Passive Attack to Decrypt Traffic – wireless Traffic can be intercepted by a passive eavesdropper until an IV collision occurs. What happens when XORing two packets that use similar IV, making the attacker obtain the XOR of the two-plaintext messages.
Active Attack to Inject Traffic – the attacker uses the knowledge of the exact plaintext for one encrypted message to construct the right encrypted packets. Some of the vulnerabilities include MAC spoofing, where the addresses are spoofed through sniffing the wireless Traffic.
WEP is another vulnerability that uses the RC4 encryption algorithm called a stream cipher. It expands a short key into an infinite pseudo-random keystream.
Extended Service Set ID is a vulnerability whereby many access points broadcast the network’s name, giving way to the software of some clients to provide remote wireless clients with a list of available wireless networks. Installation of a robust security network that uses the current standards to improve authentication, access control and key management.
Installation of WEP2 increases the size of IV space-enhancing authentications to avoid staleness.
Fast packet keying improves WLAN’s security by allowing one to encrypt each packet using a different key.
A virtual private network is the VPN of a client-based IPSec that allows over-the-wire and over-the-air- IPSec encryption of all IP traffic. It doesn’t matter whether wireless security is used.

References
Li, Y., & Li, J. (2016, May). The research on ARP protocol-based authentication mechanism. In 2016 International Conference on Applied Mathematics, Simulation and Modelling. Atlantis Press.
Arora, A. (2018). Preventing wireless deauthentication attacks over 802.11 networks. arXiv preprint arXiv:1901.07301.

Check Price Discount

Study Notes & Homework Samples: »

Why Choose our Custom Writing Services

We prioritize delivering top quality work sought by students.

Top Tutors

The team is composed solely of exceptionally skilled graduate writers, each possessing specialized knowledge in specific subject areas and extensive expertise in academic writing.

Discounted Pricing

Our writing services uphold the utmost quality standards while remaining budget-friendly for students. Our pricing is not only equitable but also competitive in comparison to other writing services available.

0% similarity Index

Guaranteed Plagiarism-Free Content: We assure you that every product you receive is entirely free from plagiarism. Prior to delivery, we meticulously scan each final draft to ensure its originality and authenticity for our valued customers.

How it works

When you decide to place an order with Dissertation Help, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much instructions detail as possible.

Assignment of Writer

We analyze your order and match it with a custom writer who has the unique qualifications for that subject, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00