Fortifying The Data Link Layer: An Analysis of Security Concerns

Authors

  • Md Mazedul Alam Department of Computer Science and Engineering, University of South Asia, Bangladesh

DOI:

https://doi.org/10.54536/ajmri.v4i1.3763

Keywords:

Data Link Layer Attacks, OSI Model, Vulnerability

Abstract

Network operations are separated into seven tiers by a conceptual model of networking known as the Open Systems Interconnect Model (OSI). This explains the way layers communicate with one another.This paradigm explains the way layers communicate with one another. I discuss common Data link layer attacks in this Research, along with possible defenses, and introduce new attacks.The data link layer is regarded as an extremely vulnerable point in a secure network Because each layer operates independently of the others; if the data is compromised at the Data link layer, it cannot be discovered at higher layers. The use of various attack tools by an attacker to exploit a network is described. My findings demonstrate how effective these attacks may be when a network administrator neglects to install suitable security at the Data link layer of the OSI model.

Downloads

Download data is not yet available.

References

Altunbasak, H. C. (2006, November 20). Data link layer security inter-layering in networks. Retrieved from http://hdl.handle.net/1853/13974

Chung, C. J. (n.d.). Network attacks. Retrieved from https://www.uniteng.com/wiki/lib/exe/fetch.php?media=classlog:computernetworksecurity:12-network_attackslayer4-and-above.pdf

Chanthati, S. R. (2024). Artificial intelligence-based cloud planning and migration to cut the cost of cloud. American Journal of Smart Technology and Solutions, 3(2). https://doi.org/10.54536/ajsts.v3i2.3210

Khan, H. M., & S. M. (2024). Detecting security system misconfiguration threats in cloud computing environments. American Journal of Innovation in Science and Engineering, 3(2). https://doi.org/10.54536/ajise.v3i2.3272

Mohsin, S. M. (2020). Network security issues of data link layer. Proceedings of the 3rd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), 1–7. https://doi.org/10.1109/ICOMET46343.2020.9105242

Mustafa, A. S. (2015). Data link layer security problems and solutions. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-27574

Nasir Siddique, M. A. (2015). Data link layer security problems. Digitala Vetenskapliga Arkivet. Retrieved from http://www.diva-portal.org/smash/record.jsf?pid=diva2%3A825849

Phys, G. L. (2020). Research on computer network security problems and protective measures. IOP Conference Series: Materials Science and Engineering, 12.

Santos, G. M., & Marcillo, P. A. (n.d.). Security in the data link layer of the OSI model on LANs wired Cisco. Retrieved from https://www.researchgate.net/publication/323369974_Security_in_the_data_link_layer_of_the_OSI_model_on_LANs_wired_Cisco

Saurabh Malgaonkar, A. R. (2017). Research on Wi-Fi security protocols. International Journal of Computer Applications, 162(7), 1–8. https://doi.org/10.5120/ijca2017913335

Senecal, L. (n.d.). Data link layer attacks and their mitigation. Department of Computer Science. Retrieved from https://www.cs.dartmouth.edu/~sergey/me/netreads/L2-security-Bootcamp.pdf

Szabó, T. (n.d.). Network security problems on data link layer. Retrieved from Hadmernok.hu: http://hadmernok.hu/2013_1_szabot_1.pdf

Vyncke, E., & Paggen, C. (n.d.). Security in the data link layer of the OSI model on LANs wired Cisco. Retrieved from https://shorturl.at/sQpVs

Yeung, K.-H. (2008). Tools for attacking data link layer. International MultiConference of Engineers and Computer Scientists, II, 1–7.

Downloads

Published

2025-01-17

How to Cite

Alam, M. M. (2025). Fortifying The Data Link Layer: An Analysis of Security Concerns. American Journal of Multidisciplinary Research and Innovation, 4(1), 11–24. https://doi.org/10.54536/ajmri.v4i1.3763