In: Accounting
MAC address flooding attack (CAM table flooding attack) is a type of network attack where an attacker connected to a switch port floods the switch interface with very large number of Ethernet frames with different fake source MAC address.In this attack the network is flooded with the fake MAC addresses. The hacker uses this attack to steal sensitive data that is being transferred in the network. The attack is used for forcing the legitimate MAC table contents out of the switch and forcing the unicast flooding behavior for potentially sending sensitive information to portions of the network where it is not normally intended to go.
There are some methods to prevent the Mac address flooding attack such as
Switch port - port security, in this method you can use the port security feature to restrict input to an interface by limiting and identifying MAC addresses of the stations allowed to access the port.
AAA Method indicates Authentication, Authorization, Accounting. By the perfect authentication and authorisation the number of fake and duplicate MACs can be prohibited while entering into the storage