基于生成树协议的BPDU配置攻击和接管根桥的计算机网络性能线性回归分析

Yuliani Indrianingsih, Hero Wintolo, Eviana Yulianti Saputri
{"title":"基于生成树协议的BPDU配置攻击和接管根桥的计算机网络性能线性回归分析","authors":"Yuliani Indrianingsih, Hero Wintolo, Eviana Yulianti Saputri","doi":"10.15575/join.v6i2.703","DOIUrl":null,"url":null,"abstract":"Spanning Tree Protocol (STP) is used in manageable switch devices that apply more than one path to the connection between switches. This study aims to assist engineer staff in improving STP network security. Furthermore, the benefit is to improve the STP network security system by using the Spanning Tree Protocol and Virtual Local Area Network (VLAN) trunking mitigation techniques. The results of testing data before STP is attacked, after STP attacked, and anticipatory data. Then a simple linear regression analysis is carried out by the result of that there is not a significant relationship between time and size in the DoS attack, which  48.6% of the time variable is influenced by the size of  variable, while  the remaining 51.4% by other variables. Root attack is 43.8%-time variable is influenced by size variable, the remaining 56.2% by other variables. Correlation between Karl Pearson DoS and root, there is a significant relationship between time and size, with the DoS correlation coefficient (-0.697) in contrast root (-0.662), and paired sample t-test (paired sample t-test) can be concluded the anticipation which is done by using BPDU guard and root guard mitigation.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2021-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Spanning Tree Protocol (STP) Based Computer Network Performance Analysis on BPDU Config Attacks and Take Over Root Bridge Using the Linear Regression Method\",\"authors\":\"Yuliani Indrianingsih, Hero Wintolo, Eviana Yulianti Saputri\",\"doi\":\"10.15575/join.v6i2.703\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Spanning Tree Protocol (STP) is used in manageable switch devices that apply more than one path to the connection between switches. This study aims to assist engineer staff in improving STP network security. Furthermore, the benefit is to improve the STP network security system by using the Spanning Tree Protocol and Virtual Local Area Network (VLAN) trunking mitigation techniques. The results of testing data before STP is attacked, after STP attacked, and anticipatory data. Then a simple linear regression analysis is carried out by the result of that there is not a significant relationship between time and size in the DoS attack, which  48.6% of the time variable is influenced by the size of  variable, while  the remaining 51.4% by other variables. Root attack is 43.8%-time variable is influenced by size variable, the remaining 56.2% by other variables. Correlation between Karl Pearson DoS and root, there is a significant relationship between time and size, with the DoS correlation coefficient (-0.697) in contrast root (-0.662), and paired sample t-test (paired sample t-test) can be concluded the anticipation which is done by using BPDU guard and root guard mitigation.\",\"PeriodicalId\":32019,\"journal\":{\"name\":\"JOIN Jurnal Online Informatika\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"JOIN Jurnal Online Informatika\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.15575/join.v6i2.703\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"JOIN Jurnal Online Informatika","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.15575/join.v6i2.703","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

生成树协议STP (Spanning Tree Protocol)用于可管理的交换设备,在交换机之间使用多条路径连接。本研究旨在协助工程师提高STP网路的安全性。通过使用生成树协议和VLAN (Virtual Local Area network)集群缓解技术,提高STP网络的安全性。STP被攻击前、攻击后的测试数据和预期数据的测试结果。然后进行简单的线性回归分析,结果表明DoS攻击中时间与规模之间不存在显著关系,其中48.6%的时间变量受变量规模的影响,其余51.4%受其他变量的影响。根攻击占43.8%,时间变量受大小变量影响,其余56.2%受其他变量影响。Karl Pearson DoS与根的相关性,时间和规模之间存在显著的相关关系,DoS的相关系数为-0.697,而根的相关系数为-0.662,配对样本t检验(配对样本t检验)可以推断出使用BPDU保护和根保护缓解所做的预测。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Spanning Tree Protocol (STP) Based Computer Network Performance Analysis on BPDU Config Attacks and Take Over Root Bridge Using the Linear Regression Method
Spanning Tree Protocol (STP) is used in manageable switch devices that apply more than one path to the connection between switches. This study aims to assist engineer staff in improving STP network security. Furthermore, the benefit is to improve the STP network security system by using the Spanning Tree Protocol and Virtual Local Area Network (VLAN) trunking mitigation techniques. The results of testing data before STP is attacked, after STP attacked, and anticipatory data. Then a simple linear regression analysis is carried out by the result of that there is not a significant relationship between time and size in the DoS attack, which  48.6% of the time variable is influenced by the size of  variable, while  the remaining 51.4% by other variables. Root attack is 43.8%-time variable is influenced by size variable, the remaining 56.2% by other variables. Correlation between Karl Pearson DoS and root, there is a significant relationship between time and size, with the DoS correlation coefficient (-0.697) in contrast root (-0.662), and paired sample t-test (paired sample t-test) can be concluded the anticipation which is done by using BPDU guard and root guard mitigation.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
2
审稿时长
12 weeks
期刊最新文献
Malware Image Classification Using Deep Learning InceptionResNet-V2 and VGG-16 Method Texture Analysis of Citrus Leaf Images Using BEMD for Huanglongbing Disease Diagnosis Implementation of Ant Colony Optimization – Artificial Neural Network in Predicting the Activity of Indenopyrazole Derivative as Anti-Cancer Agent The Implementation of Restricted Boltzmann Machine in Choosing a Specialization for Informatics Students Digital Image Processing Using YCbCr Colour Space and Neuro Fuzzy to Identify Pornography
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1