2014
DOI: 10.1002/sec.1142
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing the performance and security against media‐access‐control table overflow vulnerability attacks

Abstract: A media‐access‐control (MAC) table of switches is used to store the MAC addresses of stations in a local area network (LAN) segment to enable frame forwarding. Each incoming frame is broadcast to all switch ports through a switch backplane when an MAC address is not registered in the MAC table. If an address is registered, the switch forwards the frame to the port connected to the destination host. An MAC table overflow (MTO) vulnerability attack causes the MAC table of all switches to overflow in an LAN segme… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 13 publications
(13 reference statements)
0
4
0
Order By: Relevance
“…Assuming the desired number of flow table evictions is λ, it can be inferred that flow entries with positions less than λ in the flow table will be evicted. Therefore, we define the survival rate x f of flow entry f during each eviction as shown in (6), where L f represents the position index of flow f in the flow table (starting from 0). Assuming the number of batches of attack flows sent in a single attack cycle is d, which represents the number of times the flow table overflows within a single attack cycle, the survival rate P f of attack flow entries within a single attack cycle can be defined as shown in (7).…”
Section: Attack Mode Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Assuming the desired number of flow table evictions is λ, it can be inferred that flow entries with positions less than λ in the flow table will be evicted. Therefore, we define the survival rate x f of flow entry f during each eviction as shown in (6), where L f represents the position index of flow f in the flow table (starting from 0). Assuming the number of batches of attack flows sent in a single attack cycle is d, which represents the number of times the flow table overflows within a single attack cycle, the survival rate P f of attack flow entries within a single attack cycle can be defined as shown in (7).…”
Section: Attack Mode Analysismentioning
confidence: 99%
“…S OFTWARE-DEFINED Networks(SDN) [1], as a novel network architecture, exhibits characteristics such as centralized control, separation of forwarding and control planes, and network programmability [2]. However, this new architectural paradigm also introduces novel network threats [3], [4], including security concerns in the data plane [5], [6]. Currently, switches that support the OpenFlow protocol [7] employ TCAM [8] to store flow entries.…”
Section: Introductionmentioning
confidence: 99%
“…Due to its good combination with various cloud services, SDN has been widely deployed in recent years, and its security has become the focus of attention in the industry. However, the introduction of the new architecture also brings a lot of new problems [1], among which security is the most noteworthy, including the security of the data plane [2,3]. e data plane not only will be affected by existing attacks in traditional networks (such as DDoS attacks [4]) but will also bring new types of attacks due to its own architecture, the most typical of which are flow table overflow attacks [5,6].…”
Section: Introductionmentioning
confidence: 99%
“…The medium access control (MAC) address is a unique number obtained from a central authority and assigned to a network interface card (NIC), so that no two NICs have the same MAC address . This means that MAC address conflict is greatly avoided ,…”
Section: Introductionmentioning
confidence: 99%