Show simple item record

dc.contributor.advisorO’ Raw, Johnen
dc.contributor.authorGlackin, Stephenen
dc.date.accessioned2017-03-21T14:05:11Z
dc.date.available2017-03-21T14:05:11Z
dc.date.issued2015-05
dc.identifier.otherMaster of Science in Computingen
dc.identifier.urihttps://research.thea.ie/handle/20.500.12065/1199
dc.description.abstractAlmost every network over the last 30 years is built on Spanning Tree Protocol (STP). This protocol makes topology information available to individual switches by exchanging Bridge Protocol Data Units (BPDUs) containing data fields which enable the Spanning Tree Algorithm (STA) to determine a hierarchy of switches on the network. A review of literature shows limited investigation into information leakage due to this protocol has been carried out since its first publication by the Digital Equipment Corporation (DEC) in 1985. Scripts were developed using the Python Programming language accepting information from STP Packets with the aim of identifying the network topology of a Local Area Network (LAN) as well as information leakage from STP. Mitigation techniques for any information leakage discovered are discussed. As a result of this project the viability of a security auditor using the developed scripts within a LAN in order to obtain a situation awareness of the network security perimeter of an organisation and assets within in this perimeter is also determined.en
dc.formatPDFen
dc.language.isoenen
dc.subjectNetwork Topologyen
dc.subjectNetwork Protocolen
dc.titleStealth analysis of Network Topology using Spanning Tree Protocolen
dc.typeMaster Thesis (taught)en
dc.publisher.institutionLetterkenny Institute of Technologyen
dc.rights.accessCreative Commonsen
dc.subject.departmentComputingen


Files in this item

Thumbnail
Thumbnail
Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record