Matches in DBpedia 2014 for { <http://dbpedia.org/resource/MAC_flooding> ?p ?o. }
Showing items 1 to 25 of
25
with 100 items per page.
- MAC_flooding abstract "In computer networking, MAC flooding is a technique employed to compromise the security of network switches.Switches maintain a MAC Table that maps individual MAC addresses on the network to the physical ports on the switch. This allows the switch to direct data out of the physical port where the recipient is located, as opposed to indiscriminately broadcasting the data out of all ports as a hub does. The advantage of this method is that data is bridged exclusively to the network segment containing the computer that the data is specifically destined for.In a typical MAC flooding attack, a switch is fed many Ethernet frames, each containing different source MAC addresses, by the attacker. The intention is to consume the limited memory set aside in the switch to store the MAC address table.The effect of this attack may vary across implementations, however the desired effect (by the attacker) is to force legitimate MAC addresses out of the MAC address table, causing significant quantities of incoming frames to be flooded out on all ports. It is from this flooding behavior that the MAC flooding attack gets its name, and it is this behavior which allows the MAC flooding attack to be used as more than a simple denial-of-service attack against the switching infrastructure.After launching a successful MAC flooding attack, a malicious user could then use a packet analyzer to capture sensitive data being transmitted between other computers, which would not be accessible were the switch operating normally. The attacker may also follow up with an ARP spoofing attack which will allow them to retain access to privileged data after switches recover from the initial MAC flooding attack.".
- MAC_flooding wikiPageID "1636119".
- MAC_flooding wikiPageRevisionID "594218266".
- MAC_flooding hasPhotoCollection MAC_flooding.
- MAC_flooding subject Category:Computer_network_security.
- MAC_flooding subject Category:Ethernet.
- MAC_flooding comment "In computer networking, MAC flooding is a technique employed to compromise the security of network switches.Switches maintain a MAC Table that maps individual MAC addresses on the network to the physical ports on the switch. This allows the switch to direct data out of the physical port where the recipient is located, as opposed to indiscriminately broadcasting the data out of all ports as a hub does.".
- MAC_flooding label "MAC flooding".
- MAC_flooding label "MAC flooding".
- MAC_flooding label "MAC flooding".
- MAC_flooding label "MAC-Flooding".
- MAC_flooding label "Mac flooding".
- MAC_flooding label "Mac flooding".
- MAC_flooding label "Saturation de la table d'apprentissage".
- MAC_flooding sameAs MAC-Flooding.
- MAC_flooding sameAs Saturation_de_la_table_d'apprentissage.
- MAC_flooding sameAs MAC_flooding.
- MAC_flooding sameAs MAC_flooding.
- MAC_flooding sameAs Mac_flooding.
- MAC_flooding sameAs Mac_flooding.
- MAC_flooding sameAs m.05jj5n.
- MAC_flooding sameAs Q1881107.
- MAC_flooding sameAs Q1881107.
- MAC_flooding wasDerivedFrom MAC_flooding?oldid=594218266.
- MAC_flooding isPrimaryTopicOf MAC_flooding.