Media Access Control Address Spoofing Attacks against Port Security

نویسندگان

  • Andrew Buhr
  • Dale Lindskog
  • Pavol Zavarsky
  • Ron Ruhl
چکیده

In this paper we describe three separate Media Access Control (MAC) address spoofing attacks that, when deployed in specific yet common layer 2 network topologies, circumvent Cisco’s port security. We show first that, with full knowledge of the network, the vendor recommended implementation of port security is both ineffective at preventing all three of these attacks, and actually decreases the difficulty of performing two of them. Next, we re-examine the attacks under less ideal conditions and demonstrate that they are feasible. Finally, we describe mitigation strategies that reduce the likelihood of success, but we argue that the use of port security as a preventative measure is difficult and may require tradeoffs between security and performance, flexibility, administrative cost, and ease of use. Keywords-port security; spoofing attacks; mitigation

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A solution for ARP spoofing: Layer-2 MAC and protocol filtering and arpserver

Most attacks are launched inside the companies by the employees of the same company. These kinds of attacks are generally against layer-2, not against layer-3 or IP. These attacks abuse the switch operation at layer-2. One of the attacks of this kind is Address Resolution Protocol (ARP) Spoofing (sometimes it is called ARP poisoning). This attack is classified as the “man in the middle” (MITM) ...

متن کامل

ARP Modification for Prevention of IP Spoofing

Although the Internet protocol (IP) has become widely successful, it has led to many security issues. Many of these security issues are related to illegal host access. An address resolution protocol (ARP) spoofing attack is another security issue related to an illegal host access. This paper deals with the prevention of these ARP spoofing attacks. ARP provides dynamic mapping between two differ...

متن کامل

Network Security using Firewall and Cryptographic Authentication

The network Security is the hottest topic in the current research scenario. The information security is really threatened by obnoxious users. With increasing vulnerabilities, caused by port scan attacks, replay attacks and predominantly IP Spoofing, targeting services, the network behavior is getting malevolent. But there is a lack of any clear threat model. The authors have endeavored to consi...

متن کامل

Enhancing the performance and security against media-access-control table overflow vulnerability attacks

A media-access-control (MAC) table of switches is used to store the MAC addresses of stations in a local area network (LAN) segment to enable frame forwarding. Each incoming frame is broadcast to all switch ports through a switch backplane when an MAC address is not registered in the MAC table. If an address is registered, the switch forwards the frame to the port connected to the destination h...

متن کامل

Counter Measures to Combat Misuses of MAC Address Spoofing Techniques

Counter Measures to Combat Misuses of MAC Address Spoofing Techniques Alok Pandey Sr. Systems Manager, Birla Institute of Technology (Mesra), Jaipur Campus, Jaipur, Rajasthan, India Email: [email protected] Dr. Jatinderkumar R. Saini Associate Professor & I/C Director, Narmada College of Computer Application, Bharuch, Gujarat, India Email: [email protected] -----------------------...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011