2. Effective mitigation of these attacks in real time is not
plausible and might not even be cost effective.
Various precautionary measures can more effective in
handling these attacks and can save up a lot of investment in
terms of time and money.
3. For the educational purpose of our project we had
studied various networking attacks and now are extending
our further work to handle such vulnerability and threats.
To handle these loop holes and weakness we are
discussing and implementing some security constructs.
4. . We are presenting the following constructs:
Implementing Spanning Tree Protocol (STP)
Refining STP parameters and adding additional security
constructs.
Implementing Access lists permits and denial (ACL)
We are presenting the above constructs and there effects in
securing the network from various problems and security loop
holes.
13. Using Cisco Packet Tracer as a simulation tool, we are implementing various
network strengthening constructs to better equip the network to handle attacks.
There are a lot more vulnerabilities and threats that can be evaluated and be
nipped in the bud before they can escalate to attacks. More should be done to
study and mitigate them to resolve the problems before they persist.
Also submitted a paper at the IC3 conference.
.