1/4
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
MAC Flooding
a network attack technique that attempts to compromise the security of a network switch by attempting to overflow the switch’s MAC table
-fake MAC addresses flood the switch, triggering a fail-safe mode where it behaves like a hub
Data Snooping
occurs when an attacker captures sensitive data by forcing the switch broadcast traffic
Disrupting Service
arises from MAC flooding, causing a DoS attack by overwhelming the network with unnecessary traffic
Bypassing security measures
MAC flooding can bypass security measures like MAC address filtering
MAC Flooding prevention
use anomaly-based Intrustion Detection System (IDS)
employ network monitoring tools
configure port security to limit MAC addresses per port