Stealth analysis of Network Topology using Spanning Tree Protocol
dc.contributor.advisor | O’ Raw, John | en |
dc.contributor.author | Glackin, Stephen | en |
dc.date.accessioned | 2017-03-21T14:05:11Z | |
dc.date.available | 2017-03-21T14:05:11Z | |
dc.date.issued | 2015-05 | |
dc.identifier.other | Master of Science in Computing | en |
dc.identifier.uri | https://research.thea.ie/handle/20.500.12065/1199 | |
dc.description.abstract | Almost every network over the last 30 years is built on Spanning Tree Protocol (STP). This protocol makes topology information available to individual switches by exchanging Bridge Protocol Data Units (BPDUs) containing data fields which enable the Spanning Tree Algorithm (STA) to determine a hierarchy of switches on the network. A review of literature shows limited investigation into information leakage due to this protocol has been carried out since its first publication by the Digital Equipment Corporation (DEC) in 1985. Scripts were developed using the Python Programming language accepting information from STP Packets with the aim of identifying the network topology of a Local Area Network (LAN) as well as information leakage from STP. Mitigation techniques for any information leakage discovered are discussed. As a result of this project the viability of a security auditor using the developed scripts within a LAN in order to obtain a situation awareness of the network security perimeter of an organisation and assets within in this perimeter is also determined. | en |
dc.format | en | |
dc.language.iso | en | en |
dc.subject | Network Topology | en |
dc.subject | Network Protocol | en |
dc.title | Stealth analysis of Network Topology using Spanning Tree Protocol | en |
dc.type | Master Thesis (taught) | en |
dc.publisher.institution | Letterkenny Institute of Technology | en |
dc.rights.access | Creative Commons | en |
dc.subject.department | Computing | en |