Security design considerations/issues for routers and switches
#1



[attachment=8006]

By
Aditya Varakantam

Professor
Dr.Ravi Mukkamala

Overview
Definition
Motivation for providing Router Security
Router security considerations
Router Security Policy
Switch security considerations
Conclusion
References

Definition
Router
Router is a device which extracts the destination address from the incoming packet and sends it to the destination through the optimal path. Directing data between portions of a network is the purpose of a router.

Routers operate at the Network layer of the OSI model. They pass traffic between two different IP networks which may be either LANs or WANs

Switch

Switches listen to the traffic on each Ethernet port and discover to which port each attached device is connected. The switch then sends traffic directly to the destination port

By using a switch we can ensure that most of the network traffic only goes where it needs to rather than to every port. Thus increasing the network performance

Possible Attacks on Routers

Session Hijacking
Session Replay Attack
Rerouting Attack
Masquerade Attacks

Motivation for providing Router security
Compromise of a router can lead to various security problems on the network served by that router, or even other networks with which that router communicates.

Compromise of a router’s route tables can result in reduced performance, denial of network communication services, and exposure of sensitive data.

Compromise of a router’s access control can result in exposure of network configuration details or denial of service, and can facilitate attacks against other network components.

A poor router filtering configuration can reduce the overall security of an entire enclave, expose internal network components to scans and attacks, and make it easier for attackers to avoid detection.

Proper use of router cryptographic security features can help protect sensitive data, ensure data integrity, and facilitate secure cooperation between independent enclaves.

Router Security Policy
The innermost layer is the physical security of the router

The next innermost layer is the stored software and configuration state of the router

The next outermost layer has the dynamic configuration (Routing Tables)

The outer zone of the diagram represents the intra-network and inter-network traffic that the router manages.











Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: random descritizatrion algorithem in routers, security issues in manet a review, design considerations for roadside safety ppt, distributed and scalable routing table manager for the next generation ip routers existing system, design considerations solar energy harvesting wireless embedded system, project topic railway signal and switches, e voting and issues,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Implementation Issues in Spectrum Sensing for Cognitive Radios seminar surveyer 3 3,639 16-03-2015, 02:23 PM
Last Post: seminar report asees
  MICRO CONTROLLER BASED SECURITY SYSTEM USING SONAR ajukrishnan 5 7,146 31-01-2015, 11:55 PM
Last Post: Guest
  Android Mobile Security – An Issue of Future computer girl 2 2,390 24-08-2013, 10:26 AM
Last Post: computer topic
  BIT for Intelligent System Design Electrical Fan 2 2,712 13-02-2013, 10:27 AM
Last Post: seminar details
  GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS & SECURITY full report seminar presentation 1 2,729 06-02-2013, 10:02 AM
Last Post: seminar details
  Capacitor Balance Issues of the Diode-Clamped Multilevel Inverter Operated in a Quasi seminar surveyer 1 2,656 26-01-2013, 10:41 PM
Last Post: Guest
  On the channel and signal crosscorrelation uplink and downlink of mobile UHFDTV with seminar class 2 2,047 10-01-2013, 05:30 PM
Last Post: Guest
  Design & Development of a GSM Based Vehicle Theft Control System seminar class 9 11,418 29-11-2012, 01:15 PM
Last Post: seminar details
  Improved Design of High-Performance Parallel Decimal Multipliers seminar-database 1 1,922 29-11-2012, 12:34 PM
Last Post: seminar details
  Opportunistic Routing for Wireless Ad Hoc and Sensor Networks: Present and Future seminar presentation 3 2,999 22-11-2012, 01:26 PM
Last Post: seminar details

Forum Jump: