MAC Flooding

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/4

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

5 Terms

1
New cards

MAC Flooding

a network attack technique that attempts to compromise the security of a network switch by attempting to overflow the switch’s MAC table

-fake MAC addresses flood the switch, triggering a fail-safe mode where it behaves like a hub

2
New cards

Data Snooping

occurs when an attacker captures sensitive data by forcing the switch broadcast traffic

3
New cards

Disrupting Service

arises from MAC flooding, causing a DoS attack by overwhelming the network with unnecessary traffic

4
New cards

Bypassing security measures

MAC flooding can bypass security measures like MAC address filtering

5
New cards

MAC Flooding prevention

  • use anomaly-based Intrustion Detection System (IDS)

  • employ network monitoring tools

  • configure port security to limit MAC addresses per port