Skip to main content

SNMP-Based Detection of VLAN Hopping Attack Risk

  • Conference paper
  • First Online:
  • 1574 Accesses

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 514))

Abstract

Virtual local area network (VLAN) is commonly used to divide a big network into several small network segments. Also, many adopt VLAN for dissecting LANs in order to prevent communications between different VLANs for security and management purposes. It is known that inserting an additional VLAN tag into Ethernet frames, referred to as VLAN hopping attack, can bypass the VLAN-based network separation. There are two preconditions for the attack. The first condition is that a hacker needs to know the destination’s VLAN identification number and the second condition is that the attacking system needs to be connected a switch’s trunk port that is used for connecting a switch. In this study, we propose an SNMP (Simple Network Management Protocol)-based detection method to effectively find a port and an MAC address that meet the second condition before a VLAN hopping attack begins. Since SNMP is implemented by most network components, our method can be easily deployed to the current VLAN networks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. CISCO. Inter-Switch Link and IEEE 802.1Q Frame Format. https://www.cisco.com/c/en/us/support/docs/lan-switching/8021q/17056-741-4.html. Accessed 25 Aug 2006

  2. IEEE Computer Society (2006) IEEE standard for local and metropolitan area networks—virtual bridged local area networks

    Google Scholar 

  3. SANS Institute (2016) Virtual LAN security weaknesses and countermeasures. https://www.sans.org/reading-room/whitepapers/networkdevs/virtual-lan-security-weaknesses-countermeasures-1090

  4. David Hucaby. VLANs and Trunking. http://www.ciscopress.com/articles/article.asp?p=29803&seqNum=3. Accessed 25 Oct 2002

  5. Cisco Networking Academy. Dynamic Trunking Protocol (3.2.3) > Cisco Networking Academy’s Introduction to VLANs. http://www.ciscopress.com/articles/article.asp?p=2181837&seqNum=8. Accessed 7 Apr 2014

  6. Convery S (2002) Hacking layer 2: fun with ethernet switches. https://www.blackhat.com/presentations/bh-usa-02/bh-us-02-convery-switches.pdf

  7. Bhaij Y (2006) Layer 2 attacks & mitigation techniques. https://www.sanog.org/resources/sanog7/yusuf-L2-attack-mitigation.pdf

  8. RFC 1157 (1990) A simple network management protocol (SNMP). https://www.ietf.org/rfc/rfc1157.txt

  9. Rose M (1990) Management information base for network management of TCP/IP-based inter-nets: MIB-II. https://tools.ietf.org/html/rfc1213

  10. CNRS Grenoble, CRIC Homepage. http://cric.grenoble.cnrs.fr/Administrateurs/Outils/MIBS/?oid=1.3.6.1.2.1.2.2.1.2

  11. CISCO-VTP-MIB. ftp://ftp.cisco.com/pub/mibs/v2/CISCO-VTP-MIB.my

    Google Scholar 

  12. RFC 4188. Definitions of managed objects for bridges. https://tools.ietf.org/html/rfc4188

  13. CNRS Grenoble, CRIC Homepage. http://cric.grenoble.cnrs.fr/Administrateurs/Outils/MIBS/?oid=1.3.6.1.2.1.4.22.1.2

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manhee Lee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kim, K., Lee, M. (2019). SNMP-Based Detection of VLAN Hopping Attack Risk. In: Kim, K., Baek, N. (eds) Information Science and Applications 2018. ICISA 2018. Lecture Notes in Electrical Engineering, vol 514. Springer, Singapore. https://doi.org/10.1007/978-981-13-1056-0_28

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1056-0_28

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1055-3

  • Online ISBN: 978-981-13-1056-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics