Configure the switches to limit the number of MAC addresses on the ports that are connected to the end stations.Authentication, Authorization, and Accounting Servers (AAA) can be used for authentication against MAC addresses as an preventive measures.To stay safe from this attack, follow the following: The hacker finally uses an packet analyzer to capture these packets to steal the sensitive information.Once the MAC address table is full, the network switch enters into the fail-open mode and behaves like a network hub, broadcasting all the packets on all the switch ports.In this attack, the hacker first connects to the switch ports and floods it's interface by forcing legitimate MAC addresses out of the MAC address table through very large number of fake MAC addresses.The intention is to consume the limited memory set aside in the switch to store the MAC address table. The attack is used for forcing the legitimate MAC table contents out of the switch and forcing the unicast flooding behavior for potentially sending sensitive information to portions of the network where it is not normally intended to go. In a typical MAC flooding attack, a switch is fed many Ethernet frames, each containing different source MAC addresses, by the attacker. The hacker uses this attack to steal sensitive data that is being transferred in the network. In this attack the network is flooded with the fake MAC addresses. MAC (Media Access Control) Flooding is a type of cyber attack done in a network to compromise the security of the network switches.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |