Security Protocols in the Data Link Layer

04/07/2023

Security Protocols in the Data Link Layer

By Graciela Martínez, Head of LACNIC CSIRT

Integrating security into systems has become essential to protect the confidentiality, integrity, and availability of the information that is transmitted.

We have often heard about in-depth security or layered security in reference to the different levels of protection that surround the critical assets of an organization’s core network.

In this article we will focus on the data link layer and some of the security protocols we can implement there.

Data link layer

As a quick overview, let’s briefly recall that the data link layer —known as layer 2 in the Open Systems Interconnection model (OSI model)— is responsible for connecting the physical layer with the layers above it. In this layer, the information travels in the form of datagrams or frames.

THE OSI MODEL

Application layer
Network services to applications
Presentation layer
Data representation
Session layer
Communication between network devices
Transport layer
End-to-end connection and datareliability
Network layer
Logical routing and addressing
Data link layer
Physical addressing (MAC and LLC)
Physical layer
Binary signal and transmission

This layer performs several functions, all or part of which may be implemented depending on the protocol that is used:

(Free access, no subscription required)

  • It controls access to the physical medium through which connected devices share and transmit information.
  • It detects and potentially corrects errors, for example, in the event of interference or signal attenuation.
  • It delivers data to the corresponding device based on its physical address, known as English Media Access Control address (MAC address).
  • It controls the flow between two devices to avoid information loss and frame collision.

What are the security risks in layer 2?

The data link layer is not immune to attacks.

In addition to the attacks on certain vulnerabilities typical of incorrectly configured and/or updated systems, certain attacks are associated with LAN networks. Some of these attacks are mentioned below.

  • Spoofing. Spoofing is an identity theft technique used by an attacker who impersonates a trusted entity, in this case, another device on the network, by changing its MAC address.
  • Denial of Service (DoS). This technique attempts to prevent or limit access to a network device by saturating some of its resources, for example, by flooding the target device with unwanted traffic.
  • Sniffing. The attacker listens to the transmitted traffic, but takes no action.
  • DHCP Spoofing. The attacker places a fake DHCP server in the network [1]to issue fake network information to clients.
  • ARP[2] poisoning. The attacker’s goal is to modify the information in the ARP table where the IP address associated with a device’s MAC address is temporarily stored and replace it with its own MAC address for the purpose of redirecting traffic.

As we can see, some of the attacks mentioned above may also occur in other network layers.

The views expressed by the authors of this blog are their own and do not necessarily reflect the views of LACNIC.

Subscribe
Notify of

1 Comentarios
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
Lindsey John
5 months ago

Great article! Security protocols at the data link layer are often overlooked, yet they play a crucial role in preventing threats like ARP poisoning and MAC spoofing. The breakdown of IEEE 802 protocols and practical security measures is especially helpful. Thanks for shedding light on this important topic!