In MAC flooding attack, a switch is flooded with ethernet frames, each containing different source MAC addresses.This frames with unique invalid source MAC address flood the switch and exhaust CAM table space.The result is that new entireis cannot be inserted because of the exhausted CAM table space and traffic is subsequently flooded out all ports
The result of this attack causes the switch to enter a state called failopen mode, in which all incoming packets are broadcast out on all ports (Same as hub), instead of sending unicasts in normal operation. A malicious user could then use a packet sniffer to capture sensitive data from other computers, which would not be accessible were the switch operating normally.
MAC Flooding attack can be prevented by
- Implement port security.
- Implement VLAN access maps
With havin so much content and articles do you ever run into any problems of plagorism
ReplyDeleteor copyright violation? My website has a lot of exclusive
content I've either created myself or outsourced but it looks like a lot of
it is popping it up all over the web without my
agreement. Do you know any methods to help prevent content from being stolen? I'd definitely appreciate it.