International Journal Of Creative and Innovative Research In All Studies
International Peer-Reviewed Journal

 >   Manuscript Details

Manuscript Details - IJCIRAS1610

ManuScript Details
Paper Id: IJCIRAS1610
Title: PERFORMANCE ANALYSIS OF NETWORK PROTOCOL ATTACKS USING EVIL FOCA
Published in: International Journal Of Creative and Innovative Research In All Studies
Publisher: IJCIRAS
ISSN: 2581-5334
Volume / Issue: Volume 3 Issue 1
Pages: 6
Published On: 6/5/2020 4:59:31 AM      (MM/dd/yyyy)
PDF Url: http://www.ijciras.com/PublishedPaper/IJCIRAS1610.pdf
Main Author Details
Name: Zin May Zaw
Institute: Mandalay Technological University, Myanmar
Co - Author Details
Author Name Author Institute
Thiri Kyaw Mandalay Technological University, Myanmar
Abstract
Research Area: Computer Science & Engineering
KeyWord: CDP, DHCP, STP and Evil Foca
Abstract: The world in today needs security in everywhere especially in communication. To make sure the network, a security engineer must know of a wide variety of attack types. There are so two types of attacks in communication such as layer protocol attacks and routing protocol attacks. Data Link layeris considered as the most fragile connection in a made sure about system. In the event that an underlying assault comes in at Layer 2, the entire system can be undermined. This paper analyses six attacks in Layer 2 protocol that are ARP (address resolution protocol) attack, CDP (Cisco Discovery protocol) attack, DHCP (Dynamic Host Configuration protocol) attack, DTP (Dynamic Trunking protocol) attack, STP (Spanning Tree protocol) and HSRP/VRRP (Host Standby Router Protocol/ Virtual Router Redundancy protocol). To represent the shortcoming of Layer 2 systems, assaulting tools for this layer are studied and examined in this paper. The principle elements of these tools and how they can be utilized to dispatch assaults are talked about. Although the authors of this paper strongly against malicious attacks to networks, it is a belief that the best way to protect a network is to know how it can be attacked. The system is implemented using Evil Foca tools. The tools drilled down in this paper can along these lines be utilized for doing assaults as a component of testing and learning.
Citations
Copy and paste a formatted citation or use one of the links to import into a bibliography manager and reference.

IEEE
Zin May Zaw, Thiri Kyaw, "PERFORMANCE ANALYSIS OF NETWORK PROTOCOL ATTACKS USING EVIL FOCA ", International Journal Of Creative and Innovative Research In All Studies, vol. 3, no. 1, pp. 15-20, 2020.
MLA Zin May Zaw, Thiri Kyaw "PERFORMANCE ANALYSIS OF NETWORK PROTOCOL ATTACKS USING EVIL FOCA ." International Journal Of Creative and Innovative Research In All Studies, vol 3, no. 1, 2020, pp. 15-20.
APA Zin May Zaw, Thiri Kyaw (2020). PERFORMANCE ANALYSIS OF NETWORK PROTOCOL ATTACKS USING EVIL FOCA . International Journal Of Creative and Innovative Research In All Studies, 3(1), 15-20.
PERFORMANCE ANALYSIS OF NETWORK PROTOCOL ATTACKS USING EVIL FOCA
Number Of Downloads - 20


Last downloaded on 06/05/2024
Similar-Paper
Manuscript

Need Some Help?

Feel free to visit our FAQ section. You can also send us an email here or give us a call on +91 9898652593.