Enhancing the performance and security against media-access-control table overflow vulnerability attacks
نویسندگان
چکیده
A media-access-control (MAC) table of switches is used to store the MAC addresses of stations in a local area network (LAN) segment to enable frame forwarding. Each incoming frame is broadcast to all switch ports through a switch backplane when an MAC address is not registered in the MAC table. If an address is registered, the switch forwards the frame to the port connected to the destination host. An MAC table overflow (MTO) vulnerability attack causes the MAC table of all switches to overflow in an LAN segment, and all incoming frames are broadcast to every port in the switch. The attack degrades switch-based LANs (each port of a switch comprises an individual operating domain and switch bandwidth) to bus-based LANs (all ports are bounded to one operating domain and share a bandwidth similarly to a hub), causing information leakages and reducing the effective bandwidth; a virtual LAN configuration can reduce but not eliminate the associated damage. This paper presents the security effect of an MTO vulnerability attack, and a novel per-port-based MAC table design is proposed to solve this type of vulnerability. The experimental results indicate that the mechanism of the proposed design eliminates the damage caused by such attacks. Copyright © 2014 John Wiley & Sons, Ltd.
منابع مشابه
A Secure Access Control Mechanism against Internet Crackers
Internet servers are always in danger of being “hijacked” by various attacks like the buffer overflow attack. To minimize damages in cases where full control of the servers are stolen, imposing access restrictions on the servers is still needed. However, designing a secure access control mechanism against hijacking is not easy because that mechanism itself can be a security hole. In this paper,...
متن کاملSecure Cache: Run-Time Detection and Prevention of Buffer Overflow Attacks
This paper shows a novel cache architecture, called SCache, to detect and prevent buffer-overflow attacks at run time. A number of malicious codes exploit buffer-overflow vulnerability to alter a return-address value and hijack the program-execution control. In order to solve the security issue, SCache generates replica cache lines on each return-address store, and compares the original value l...
متن کاملLibsafe: Transparent System-wide Protection Against Buffer Overflow Attacks
Libsafe is a practical solution that protects against the most common forms of buffer overflow attacks. Such attacks often result in granting the attacker full privileges on the target system. Libsafe is implemented as a shared library that intercepts calls to vulnerable standard library functions. Based on an inspection of the process stack and the function arguments, Libsafe ensures that no r...
متن کاملVTint: Protecting Virtual Function Tables' Integrity
In the recent past, a number of approaches have been proposed to protect certain types of control data in a program, such as return addresses saved on the stack, rendering most traditional control flow hijacking attacks ineffective. Attackers, however, can bypass these defenses by launching advanced attacks that corrupt other data, e.g., pointers indirectly used to access code. One of the most ...
متن کاملA collusion attack on the fuzzy vault scheme
The Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys. This leads to the possibility of enhancing the security in environments where these errors can be common, such as biometrics storage systems. Although several researchers have provided implementations, we find that the scheme is vulnerable to attacks when not properly used. This paper describes an attack on t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Security and Communication Networks
دوره 8 شماره
صفحات -
تاریخ انتشار 2015