Paper
21 February 2001 Intrusion detection considerations for switched networks
Thomas D. Tarman, Edward L. Witzke
Author Affiliations +
Proceedings Volume 4232, Enabling Technologies for Law Enforcement and Security; (2001) https://doi.org/10.1117/12.417520
Event: Enabling Technologies for Law Enforcement, 2000, Boston, MA, United States
Abstract
Many private and public networks are based on network switching technologies. However, switched networks present a number of challenges to intrusion detection equipment. These challenges include limited visibility of network flows at the edges of the network, high-speed packet processing, and highly-aggregated flows in the core. In addition, switched networks typically implement protocols specific for Layer 2 functions, such as connection establishment and connection routing, which can be attacked to deny service to higher layer protocols and applications. Since these attacks cannot be detected by Internet Protocol intrusion detection equipment. Layer 2 intrusion detection is required. This paper describes an approach for performing intrusion monitoring in switched, Layer 2 networks, specifically, Asynchronous Transfer Mode networks.
© (2001) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Thomas D. Tarman and Edward L. Witzke "Intrusion detection considerations for switched networks", Proc. SPIE 4232, Enabling Technologies for Law Enforcement and Security, (21 February 2001); https://doi.org/10.1117/12.417520
Lens.org Logo
CITATIONS
Cited by 5 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Sensors

Computer intrusion detection

Asynchronous transfer mode

Switches

Network architectures

Sensor networks

Interfaces

Back to Top