Paper
21 February 2001 Intrusion detection considerations for switched networks
Thomas D. Tarman, Edward L. Witzke
Author Affiliations +
Proceedings Volume 4232, Enabling Technologies for Law Enforcement and Security; (2001) https://doi.org/10.1117/12.417520
Event: Enabling Technologies for Law Enforcement, 2000, Boston, MA, United States
Abstract
Many private and public networks are based on network switching technologies. However, switched networks present a number of challenges to intrusion detection equipment. These challenges include limited visibility of network flows at the edges of the network, high-speed packet processing, and highly-aggregated flows in the core. In addition, switched networks typically implement protocols specific for Layer 2 functions, such as connection establishment and connection routing, which can be attacked to deny service to higher layer protocols and applications. Since these attacks cannot be detected by Internet Protocol intrusion detection equipment. Layer 2 intrusion detection is required. This paper describes an approach for performing intrusion monitoring in switched, Layer 2 networks, specifically, Asynchronous Transfer Mode networks.
© (2001) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Thomas D. Tarman and Edward L. Witzke "Intrusion detection considerations for switched networks", Proc. SPIE 4232, Enabling Technologies for Law Enforcement and Security, (21 February 2001); https://doi.org/10.1117/12.417520
Lens.org Logo
CITATIONS
Cited by 5 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Sensors

Computer intrusion detection

Asynchronous transfer mode

Switches

Network architectures

Sensor networks

Interfaces

RELATED CONTENT

Improved security monitoring method for network bordary
Proceedings of SPIE (March 20 2013)
Networking 20 billion devices
Proceedings of SPIE (May 03 2018)
MAN network planning
Proceedings of SPIE (October 17 2001)
Implementation of virtual LANs over ATM WANs
Proceedings of SPIE (September 16 1998)
If it walks like a duck: nanosensor threat assessment
Proceedings of SPIE (September 18 2003)

Back to Top