Defeating content addressable memory (CAM) table flooding attacks with port security




Content addressable memory (CAM) flooding attacks work by generating a large number of frames on a switch port and making the CAM Table of the switch to over flow, eventually making the switch to broadcast out received frames on all ports. The project understands how port security features can be use to limits the number of allowed mac-address on a switch port to prevent CAM flooding attack along with the actual configuration. This research covered the study of the availability mechanisms which leads to the use of port-security as the best solution among all other mechanisms. However, there are many developments that can be done in this research. The following are some recommendation that can be conducted a. Cover the wide-area network and other operating system b. Setup the system in real environment outside the laboratory in order to have better chance to test the system and see how much it is effective.

Custom tab


There are no reviews yet.

Be the first to review “Defeating content addressable memory (CAM) table flooding attacks with port security”

Your email address will not be published. Required fields are marked *

Back to Top
Product has been added to your cart