Title :
Study of Network Monitoring Theory in Switched Ethernet and its Countermeasures
Author :
Li, Min-Song ; Na, Wang
Author_Institution :
Coll. of Comput. Sci., Shaoguan Univ., Shaoguan, China
Abstract :
Network monitoring technique is an important and sensitive technique in the field of network safety. hackers usually make use of TCP/IP protocol´s flows to spoof their target . With the combination of Network Monitoring, hacker can intercept and tamper his target´s communication data, which is a significant threat to today´s network security. This paper gives an analysis on the Network Monitoring Theory in Switched Ethernet and puts forward several Countermeasures.
Keywords :
computer crime; computer network security; data communication; local area networks; transport protocols; TCP/IP protocol flows; countermeasures; hackers; network monitoring technique; network monitoring theory; network safety; network security; switched ethernet; target communication data; Encryption; IP networks; Local area networks; Monitoring; Protocols; Switches; ARP spoofing; counter-measures; network monitoring; switched ethernet;
Conference_Titel :
Internet Computing & Information Services (ICICIS), 2011 International Conference on
Conference_Location :
Hong Kong
Print_ISBN :
978-1-4577-1561-7
DOI :
10.1109/ICICIS.2011.155