{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T14:17:51Z","timestamp":1726064271054},"publisher-location":"Cham","reference-count":56,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030222765"},{"type":"electronic","value":"9783030222772"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-22277-2_6","type":"book-chapter","created":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T07:02:28Z","timestamp":1577775748000},"page":"133-172","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Threats Behind Default Configurations of Network Devices: Wired Local Network Attacks and Their Countermeasures"],"prefix":"10.1007","author":[{"given":"A.","family":"V\u00e1zquez-Ingelmo","sequence":"first","affiliation":[]},{"given":"\u00c1. M.","family":"Moreno-Montero","sequence":"additional","affiliation":[]},{"given":"F. J.","family":"Garc\u00eda-Pe\u00f1alvo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,1]]},"reference":[{"issue":"1","key":"6_CR1","doi-asserted-by":"publisher","first-page":"143","DOI":"10.4018\/IJCAC.2018010107","volume":"8","author":"H Ko","year":"2018","unstructured":"Ko, H., Mesicek, L., Choi, J., Choi, J., & Hwang, S. (2018). A study on secure contents strategies for applications with DRM on cloud computing. International Journal of Cloud Applications, 8(1), 143\u2013153.","journal-title":"International Journal of Cloud Applications"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Tewari, A., & Gupta, B. (2018). Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework. Future Generation Computer Systems. \nhttps:\/\/doi.org\/10.1016\/ j.future.2018.04.027","DOI":"10.1016\/j.future.2018.04.027"},{"key":"6_CR3","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-0105-3","volume-title":"Handbook of research on modern cryptographic solutions for computer and cyber security","author":"B Gupta","year":"2016","unstructured":"Gupta, B., Agrawal, D. P., & Yamaguchi, S. (2016). Handbook of research on modern cryptographic solutions for computer and cyber security. Pennsylvania: IGI Global."},{"key":"6_CR4","volume-title":"Computer and cyber security: principles, algorithm, applications, and perspectives","author":"BB Gupta","year":"2018","unstructured":"Gupta, B. B. (2018). Computer and cyber security: principles, algorithm, applications, and perspectives. Boca Raton: CRC Press."},{"key":"6_CR5","volume-title":"GNS3 network simulation guide","author":"C Welsh","year":"2013","unstructured":"Welsh, C. (2013). GNS3 network simulation guide. Birmingham: Packt."},{"key":"6_CR6","unstructured":"Garc\u00eda Rambla, J. L. (2012). Ataques en redes de datos IPv4 e IPv6 (p. 272). Madrid, Spain: 0xWORD."},{"issue":"2","key":"6_CR7","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1109\/SURV.2010.021110.00086","volume":"12","author":"J Sommer","year":"2010","unstructured":"Sommer, J., et al. (2010). Ethernet\u2013a survey on its fields of application. IEEE Communications Surveys Tutorials, 12(2), 263\u2013284.","journal-title":"IEEE Communications Surveys Tutorials"},{"issue":"7","key":"6_CR8","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1145\/360248.360253","volume":"19","author":"RM Metcalfe","year":"1976","unstructured":"Metcalfe, R. M., & Boggs, D. R. (1976). Ethernet: distributed packet switching for local computer networks. Communications of the ACM, 19(7), 395\u2013404.","journal-title":"Communications of the ACM"},{"key":"6_CR9","volume-title":"The art of intrusion: the real stories behind the exploits of hackers, intruders and deceivers","author":"KD Mitnick","year":"2009","unstructured":"Mitnick, K. D., & Simon, W. L. (2009). The art of intrusion: the real stories behind the exploits of hackers, intruders and deceivers. Hoboken, NJ: Wiley."},{"issue":"3","key":"6_CR10","doi-asserted-by":"publisher","first-page":"1477","DOI":"10.1109\/SURV.2012.121112.00190","volume":"15","author":"T Kiravuo","year":"2013","unstructured":"Kiravuo, T., Sarela, M., & Manner, J. (2013). A survey of Ethernet LAN security. IEEE Communications Surveys Tutorials, 15(3), 1477\u20131491.","journal-title":"IEEE Communications Surveys Tutorials"},{"key":"6_CR11","volume-title":"CCNA security 210\u2013260 official cert guide","author":"O Santos","year":"2015","unstructured":"Santos, O., & Stuppi, J. (2015). CCNA security 210\u2013260 official cert guide. Indianapolis,IN: Cisco Press."},{"key":"6_CR12","volume-title":"Cisco networking academy","author":"Cisco Packet Tracer","year":"2009","unstructured":"Cisco Packet Tracer. (2009). Cisco networking academy. San Jose, CA: Cisco Systems."},{"key":"6_CR13","volume-title":"Cisco IOS cookbook: Field-tested solutions to Cisco router problems","author":"K Dooley","year":"2006","unstructured":"Dooley, K., & Brown, I. (2006). Cisco IOS cookbook: Field-tested solutions to Cisco router problems. Sebastopol, CA: O\u2019Reilly Media."},{"key":"6_CR14","unstructured":"Sun, L., Wu, J., Zhang, Y., & Yin, H. (2013). Comparison between physical devices and simulator software for Cisco network technology teaching. In Computer Science and Education (ICCSE), 2013 8th International Conference on (pp. 1357\u20131360). IEEE."},{"issue":"63es","key":"6_CR15","first-page":"6","volume":"1999","author":"B Walters","year":"1999","unstructured":"Walters, B. (1999). VMware virtual platform. Linux Journal, 1999(63es), 6.","journal-title":"Linux Journal"},{"key":"6_CR16","unstructured":"Oracle, V. M. (2015). VirtualBox. \nhttps:\/\/www.virtualbox.org\/"},{"key":"6_CR17","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1016\/j.ieri.2012.06.124","volume":"2","author":"Y Zhang","year":"2012","unstructured":"Zhang, Y., Liang, R., & Ma, H. (2012). Teaching innovation in computer network course for undergraduate students with packet tracer. IERI Procedia, 2, 504\u2013510.","journal-title":"IERI Procedia"},{"key":"6_CR18","unstructured":"Janitor, J., Jakab, F., & Kniewald, K. (2010). Visual learning tools for teaching\/learning computer networks: Cisco networking academy and packet tracer. In: 2010 Sixth International Conference on Networking and Services (pp. 351\u2013355). IEEE."},{"key":"6_CR19","first-page":"855","volume":"33","author":"\u00c1M Moreno-Montero","year":"2017","unstructured":"Moreno-Montero, \u00c1. M., & Retorillo-Manzano, D. (2017). Design and deployment of hands-on network lab experiments for computer science engineers. International Journal of Engineering Education, 33, 855\u2013864.","journal-title":"International Journal of Engineering Education"},{"key":"6_CR20","unstructured":"Archana, C. (2015). Analysis of RIPv2, OSPF, EIGRP Configuration on router Using CISCO Packet tracer. International Journal of Engineering Science Innovative Technology, 4(2), 215\u2013222."},{"issue":"3","key":"6_CR21","first-page":"321","volume":"8","author":"W Makasiranondh","year":"2010","unstructured":"Makasiranondh, W., Maj, S. P., & Veal, D. (2010). Pedagogical evaluation of simulation tools usage in network technology education. World Transactions on Engineering Technology Education, 8(3), 321\u2013326.","journal-title":"World Transactions on Engineering Technology Education"},{"key":"6_CR22","first-page":"046","volume":"12","author":"Y Wang","year":"2010","unstructured":"Wang, Y., & Wang, J. (2010). Use gns3 to simulate network laboratory. Computer Programming Skills Maintenance, 12, 046.","journal-title":"Computer Programming Skills Maintenance"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Gil, P., Garcia, G. J., Delgado, A., Medina, R. M., Calderon, A., & Marti, P. (2014). Computer networks virtualization with GNS3: Evaluating a solution to optimize resources and achieve a distance learning. In Frontiers in Education Conference (FIE), 2014 IEEE (pp. 1\u20134). IEEE.","DOI":"10.1109\/FIE.2014.7044343"},{"key":"6_CR24","first-page":"032","volume":"10","author":"L Faxun","year":"2010","unstructured":"Faxun, L. (2010). The application of GNS3 in network experiments. Computer Telecommunication, 10, 032.","journal-title":"Computer Telecommunication"},{"key":"6_CR25","first-page":"136","volume":"20","author":"C-y PENG","year":"2010","unstructured":"PENG, C.-y., & LIU, B. (2010). Application of GNS3 at computer network teaching [J]. Theory Research, 20, 136.","journal-title":"Theory Research"},{"issue":"4","key":"6_CR26","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1109\/TCOM.1980.1094702","volume":"28","author":"H Zimmermann","year":"1980","unstructured":"Zimmermann, H. (1980). OSI reference model--The ISO model of architecture for open systems interconnection. IEEE Transactions on Communications, 28(4), 425\u2013432.","journal-title":"IEEE Transactions on Communications"},{"key":"6_CR27","volume-title":"CCNA security study guide: exam 640-553","author":"T Boyles","year":"2010","unstructured":"Boyles, T. (2010). CCNA security study guide: exam 640-553. Hoboken, NJ: Wiley."},{"key":"6_CR28","unstructured":"Dubrawsky, I. (2004). Safe layer 2 security in-depth. White paper, San Jose, CA: Cisco Inc."},{"key":"6_CR29","unstructured":"Cisco Systems. (2008). Cisco IOS security configuration guide. Retrieved from \nhttps:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/ios\/security\/configuration\/guide\/12_4\/sec_12_4_book.pdf"},{"key":"6_CR30","volume-title":"Implementing Cisco IOS network security (IINS)","author":"C Paquet","year":"2009","unstructured":"Paquet, C. (2009). Implementing Cisco IOS network security (IINS). Indianapolis, Indiana: Cisco Press."},{"key":"6_CR31","doi-asserted-by":"crossref","unstructured":"Vykopal, J., Plesnik, T., & Minarik, P. (2009). Network-based dictionary attack detection. In Future Networks, 2009 International Conference on (pp. 23\u201327). IEEE.","DOI":"10.1109\/ICFN.2009.36"},{"key":"6_CR32","unstructured":"Postel, J., & Reynolds, J. K. (1983). Telnet protocol specification (RFC 854). Retrieved from \nhttps:\/\/tools.ietf.org\/html\/rfc854"},{"key":"6_CR33","unstructured":"Ylonen, T., & Lonvick, C. (2005). The secure shell (SSH) protocol architecture (RFC 4251). Retrieved from \nhttps:\/\/tools.ietf.org\/html\/rfc4251"},{"key":"6_CR34","unstructured":"Bhaiji, Y. (2007). Understanding, preventing, and defending against layer 2 attacks. Retrieved from \nhttp:\/\/www.nanog.org\/meetings\/nanog42\/presentations\/Bhaiji_Layer_2_Attacks.pdf"},{"key":"6_CR35","unstructured":"Plummer, D. (1982). Ethernet address resolution protocol: Or converting network protocol addresses to 48. bit Ethernet address for transmission on Ethernet hardware (RFC 826). Retrieved from \nhttps:\/\/tools.ietf.org\/html\/rfc826"},{"key":"6_CR36","unstructured":"Whalen, S. (2001). An introduction to ARP spoofing. Retrieved from \nhttp:\/\/node99.org\/projects\/arpspoof"},{"key":"6_CR37","unstructured":"Wagner, R. (2001). Address resolution protocol spoofing and man-in-the-middle attacks. The SANS Institute."},{"key":"6_CR38","unstructured":"Spangler, R. (2003). Packet sniffing on layer 2 switched local area networks. Packetwatch Research, 1\u20135."},{"key":"6_CR39","unstructured":"Ornaghi, A., & Valleri, M. (2003). Man in the middle attacks. In Blackhat Conference Europe."},{"key":"6_CR40","unstructured":"Ramachandran, V., & Nandi, S. (2005). Detecting ARP spoofing: An active technique. In: International Conference on Information Systems Security (pp. 239\u2013250). Berlin: Springer."},{"key":"6_CR41","unstructured":"Convery, S. (2002). Hacking layer 2: Fun with Ethernet switches. Retrieved from  \nhttps:\/\/www.blackhat.com\/presentations\/bh-usa-02\/bh-us-02-convery-switches.pdf\n\n."},{"key":"6_CR42","unstructured":"Altunbasak, H., Krasser, S., Owen, H. L., Grimminger, J., Huth, H.-P., & Sokol, J. (2005). Securing layer 2 in local area networks. In: International conference on networking (pp. 699\u2013706). Berlin: Springer."},{"key":"6_CR43","doi-asserted-by":"crossref","unstructured":"IEEE. (2018). IEEE standard for local and metropolitan area network-bridges and bridged networks. IEEE Std 802.1Q-2018 (Revision of IEEE Std 802.1Q-2014), 1-1993.  \nhttps:\/\/doi.org\/10.1109\/IEEESTD.2018.8403927","DOI":"10.1109\/IEEESTD.2018.8403927"},{"key":"6_CR44","unstructured":"Annaamalai, A., & Mahajan, U. (2002). Dynamic trunk protocol. Google Patents"},{"key":"6_CR45","unstructured":"Cisco Networking Academy. (2014). Dynamic trunking protocol (3.2.3) > Cisco Networking Academy\u2019s Introduction to VLANs. Retrieved from \nhttp:\/\/www.ciscopress.com\/articles\/article.asp?p=2181837&seqNum=8"},{"key":"6_CR46","unstructured":"Postel, J. (1981). Internet control message protocol (RFC 792). Retrieved from \nhttps:\/\/tools.ietf.org\/html\/rfc792"},{"key":"6_CR47","unstructured":"Low, C. (2001). ICMP attacks illustrated. SANS Institute. Retrieved from \nhttps:\/\/www.sans.org\/reading-room\/whitepapers\/threats\/icmp-attacks-illustrated-477"},{"key":"6_CR48","unstructured":"Serrano-Mar\u00edn, J. D. (2018). Implementaci\u00f3n de un sistema de detecci\u00f3n\/prevenci\u00f3n de intrusiones. Ja\u00e9n: Universidad de Ja\u00e9n"},{"key":"6_CR49","unstructured":"Ramakrishna, P., & Maarof, M. (2002). Detection and prevention of active sniffing on routing protocol. In: SCOReD 2002. Student Conference on Research and Development (pp. 498\u2013501). IEEE."},{"key":"6_CR50","unstructured":"Kumar, S. (2007). Smurf-based distributed denial of service (DDoS) attack amplification in internet. In: Internet Monitoring and Protection, 2007. ICIMP 2007. Second International Conference on (pp. 25\u201325). IEEE."},{"key":"6_CR51","unstructured":"Senie, D. (1999). Changing the default for directed broadcasts in routers (RFC 2644). Retrieved from \nhttps:\/\/tools.ietf.org\/html\/rfc2644"},{"issue":"2","key":"6_CR52","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/997150.997156","volume":"34","author":"J Mirkovic","year":"2004","unstructured":"Mirkovic, J., & Reiher, P. (2004). A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review, 34(2), 39\u201353.","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"6_CR53","unstructured":"Cisco. (2014). Comparing traffic policing and traffic shaping for bandwidth limiting. Retrieved from \nhttps:\/\/www.cisco.com\/c\/en\/us\/support\/docs\/quality-of-service-qos\/qos-policing\/19645-policevsshape.html"},{"key":"6_CR54","unstructured":"Eddy, W. (2007). TCP SYN flooding attacks and common mitigations, 2070-1721. \nhttps:\/\/www.rfc-editor.org\/rfc\/rfc4987.txt"},{"key":"6_CR55","unstructured":"Droms, R. (1997). Dynamic host configuration protocol, 2070-1721. \nhttp:\/\/www.rfc-editor.org\/info\/rfc2131"},{"key":"6_CR56","unstructured":"Da\u015f, R., Karabade, A., & Tuna, G. (2015). Common network attack types and defense mechanisms. In: Signal Processing and Communications Applications Conference (SIU), 2015 23th (pp. 2658\u20132661). IEEE."}],"container-title":["Handbook of Computer Networks and Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22277-2_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T07:03:06Z","timestamp":1577775786000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22277-2_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030222765","9783030222772"],"references-count":56,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22277-2_6","relation":{},"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}