Configure the switches to limit the number of MAC addresses on the ports that are connected to the end stations.Authentication, Authorization, and Accounting Servers (AAA) can be used for authentication against MAC addresses as an preventive measures.To stay safe from this attack, follow the following: Another method than an attacker may use to circumvent existing security devices is to spoof or clone a MAC address. The hacker finally uses an packet analyzer to capture these packets to steal the sensitive information. It’s often called flood guard or a similar feature, and it restricts one particular interface from sending multiple MAC addresses out over the network and overloading that MAC address table.Once the MAC address table is full, the network switch enters into the fail-open mode and behaves like a network hub, broadcasting all the packets on all the switch ports.In this attack, the hacker first connects to the switch ports and floods it's interface by forcing legitimate MAC addresses out of the MAC address table through very large number of fake MAC addresses.The attack is used for forcing the legitimate MAC table contents out of the switch and forcing the unicast flooding behavior for potentially sending sensitive information to portions of the network where it is not normally intended to go. The hacker uses this attack to steal sensitive data that is being transferred in the network. In this attack the network is flooded with the fake MAC addresses. MAC (Media Access Control) Flooding is a type of cyber attack done in a network to compromise the security of the network switches.
0 Comments
Leave a Reply. |