Analysis of protection spanning-tree protocol

Authors

  • Б.Я. Корнієнко НАУ, кафедра комп`ютеризованих систем захисту інформації
  • С.О. Сулима НАУ, кафедра комп`ютеризованих систем захисту інформації

DOI:

https://doi.org/10.18372/2306-1472.31.1433

Abstract

 Extraordinary sweeping  of  IT – development  causes vulnerabilities and, thereafter, attacks that use these vulnerabilities. That is why one must post factum or even in advance speed up invention of new information  security systems as well as develop the old ones. The matter of article concerns Spanning-Tree Protocol  – the vivid example of the case, when the cure of the vulnerability creates dozen of new "weak spots".

Author Biographies

Б.Я. Корнієнко, НАУ, кафедра комп`ютеризованих систем захисту інформації

канд. техн. наук, доц.

С.О. Сулима, НАУ, кафедра комп`ютеризованих систем захисту інформації

студ.

References

Sean Convery. Network Security Architectures. – Cisco Press, 2005. – 792 р.

David Hucaby. CCNP Self-Study: CCNP BCMSN Exam Certification Guide, Third Edition. – Cisco Press, 2005. – 624 р.

Oleg Artemjev, Vladislav Myasnyankin. Are those loops on your network neck secure? – М.: Open Systems, 2002. – 13 р.

Gengui Zhou, Mitsuo Gen. Genetic Algorithm Approach on Multi-criteria Minimum Spanning Tree Problem. – Department of Industrial and Systems Engineering Ashikaga Institute of Technology, Ashikaga, Japan, 1997. – 17 р.

Sean Whalen, Matt Bishop. Layer 2 Authentica-tion. – 2005. – 12 р.

Sean Odom, Hanson Nottingham. Cisco Switching Black Book. – Coriolis Group, 2001. – 395 р.

Глеб Рыбаков. Построение минимального остовного дерева (алгоритмы Крускала, Прима, Борувки). – М.: Open Systems, 2005. – 14 с.

Cisco Systems, Understanding Rapid Spanning Tree Protocol (802.1w) (Document ID: 24062). – 2006. – 14 р.

Cisco Systems, Understanding Multiple Spanning Tree Protocol (802.1s) (Document ID: 24248). – 2005. – 14 р.

Dave Hucaby, Steve McQuerry. Cisco Field Manual: Catalyst Switch Configuration. – Cisco Press, 2002. – 560 c.

KnowledgeNet, Security+ (Student’s guide version 1.0). – KnowledgeNet, 2003. –471 c.

Micha Pióro, Deepankar Medhi. Routing, Flow, and Capacity Design In Communication and Computer Networks. – Morgan Kaufmann, San Francisco, 2004. – 794 р.

Paola Flocchini, Alessandro Roncato, Nicola Santoro. Computing on anonymous networks with sense of direction. – School of Information Technology and Engineering, University of Ottawa, 2002. – 25 р.

How to Cite

Корнієнко, Б., & Сулима, С. (2007). Analysis of protection spanning-tree protocol. Proceedings of National Aviation University, 31(1), 49–54. https://doi.org/10.18372/2306-1472.31.1433

Issue

Section

INFORMATION TECHNOLOGY