Full Project – Defeating content addressable memory (CAM) table flooding attacks with port security

Full Project – Defeating content addressable memory (CAM) table flooding attacks with port security

Click here to Get this Complete Project Chapter 1-5

CHAPTER ONE

INTRODUCTION

1.1    Background of Study

Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources (Wikipedia,2013), An Ethernet switch’s role is to copy Ethernet frames from one port to another. The presence of a Content Addressable Memory (CAM) table is one attribute that separates a switch from a hub. Without a functional CAM table, all frames received by a network switch would be echoed back out to all other ports, much like an Ethernet hub. A switch should only emit a frame on the port where the destination network device resides (unicast), unless the frame is for all nodes on the switch (broadcast) or multiple nodes (multicast).

Generally, the CAM table is a system memory construct used by Ethernet switch logic to different Media Access Control (MAC) addresses of stations to the ports on which they connect to the switch. This allows switches to facilitate communications between connected stations at high speed regardless of how many devices are connected to the switch. The CAM table is consulted to make the frame forwarding decision. Switches learn MAC addresses from the source address of Ethernet frames on the ports, such as Address Resolution Protocol response packets. (Wikipedia, 2014),

1.2    Attacks

This is where the attacker is coming into play. The key to understanding how MAC address table overflow attacks work is to know that MAC address tables are limited in size. MAC flooding makes use of this limitation to send to the switch a whole bunch offake source MAC addresses until the switch MAC address table is fully loaded and cannot save any more MAC

Address – Port mapping entries. The switch then enters into a fail-open mode that means that it starts acting as a hub. In this situation switch will broadcasts all received packets to all the machines on the network. As a result, the attacker can see all the frames sent from a victim host to another host without a MAC address table entry. (Behrouz, 2007).

 

1.2    Motivation of the Study

The wild use of the network for criminal and illegal activities like hacking, cracking, cybercriminals, cyber terrorist and other malicious software (such as worm) that can be done on the network thereby causing damage to user files and stopping the user from the use of the network was the reason behind this project work in other to find out a constructive measure to prevent, detect and correct security violations that involve during the transmission of data.

Some computer user believe that security issues facing home users are greatly exaggerated, and that the only entities which need to be concerned about desktop and network security are business which have critical data on their machines. I use port security feature to restrict input to an interface by limiting and identifying MAC addresses of the workstations that are allowed to access the port. When you assign secure MAC addresses to a secure port, the port does not forward packets with source addresses outside the group of defined addresses. If you limit the number of secure MAC addresses to one and assign a single secure MAC address, the workstation attached to that port is assured the full bandwidth of the port.

 

If a port is configured as a secure port and the maximum number of secure MAC addresses is reached, when the MAC address of a workstation attempting to access the port is different from any of the identified secure MAC addresses, a security violation occurs.

You can configure MAC addresses to be sticky. These can be dynamically learned or manually configured, stored in the address table, and added to the running configuration. If these addresses are saved in the configuration file, the interface does not need to dynamically relearn them when the switch restarts. Although sticky secure addresses can be manually configured, it is not recommended.

1.3    Aims and  Objectives of the Study

The basic objective of this project is to Defeating CAM Flooding attacks with port-security configuration and implementation on network. Other Objectives are to

  1. Enforce certain policies on Switch such as configuring port-security to allow network to restrict input to an interface by limiting and identifying MAC addresses of the workstations that are allowed to access the port.
  2. Setting up Switch violation Shutdown – When a violation occurs in this mode, the switch port will be taken out of service and placed in the err-disabled state. The switch port will remain in this state until manually removed, using a packet tracer in which configuration is carried out

1.4    Method of achieving the objectives

The method adopted for this work is qualitative approach; the research is carried out by adopting the qualities and behaviors of layer two securities for better understanding and ease of use. The project uses packet tracer which consist of Routers, Switches, Servers and computers e.t.ca project test laboratory which consists of a configured router and clients on which the port-security is being implemented.

The security is implemented on the clients that are on the network which is based on Mac-address policy and ensure that the system comply with it.

A good study of previous similar project works and literature works on the layer two security are the basic concepts in the development of this work. Journals, e-books and other relevant materials written by the member of the network security forums and other standardize organization like International Telecommunication union (ITU-T) among many others.

Get the Complete Project

This is a premium project material and the complete research project plus questionnaires and references can be gotten at an affordable rate of N3,000 for Nigerian clients and $8 for international clients.

Click here to Get this Complete Project Chapter 1-5

 

 

 

 

 

You can also check other Research Project here:

  1. Accounting Research Project
  2. Adult Education
  3. Agricultural Science
  4. Banking & Finance
  5. Biblical Theology & CRS
  6. Biblical Theology and CRS
  7. Biology Education
  8. Business Administration
  9. Computer Engineering Project
  10. Computer Science 2
  11. Criminology Research Project
  12. Early Childhood Education
  13. Economic Education
  14. Education Research Project
  15. Educational Administration and Planning Research Project
  16. English
  17. English Education
  18. Entrepreneurship
  19. Environmental Sciences Research Project
  20. Guidance and Counselling Research Project
  21. History Education
  22. Human Kinetics and Health Education
  23. Management
  24. Maritime and Transportation
  25. Marketing
  26. Marketing Research Project 2
  27. Mass Communication
  28. Mathematics Education
  29. Medical Biochemistry Project
  30. Organizational Behaviour

32    Other Projects pdf doc

  1. Political Science
  2. Psychology
  3. Public Administration
  4. Public Health Research Project
  5. More Research Project
  6. Transportation Management
  7. Nursing

Education

Essay 

 

Full Project – Defeating content addressable memory (CAM) table flooding attacks with port security

Click here to Get The Complete Research Project Chapter 1-5

RESEARCH PROJECT CONTENTS
CHAPTER ONE - INTRODUCTION
1.1 Background of the study
1.2 Statement of problem
1.3 Objective of the study
1.4 Research Hypotheses
1.5 Significance of the study
1.6 Scope and limitation of the study
1.7 Definition of terms
1.8 Organization of the study
CHAPETR TWO – LITERATURE REVIEW
2.1. Introduction
2.2. Conceptual Framework
2.3. Theoretical Framework
2.4 Empirical Review
CHAPETR THREE - RESEARCH METHODOLOGY
3.1 Research Design
3.2 Study Area
3.3 Population of the Study
3.4 Sample Size and Sampling Technique
3.5 Instrument for Data Collection
3.6 Validity of the Instrument
3.7 Reliability of the Instrument
3.8 Method of Data Collection
3.9 Method of Data Analysis
3.9 Method of Data Analysis
3.10 Ethical Considerations
CHAPTER FOUR - DATA PRESENTATION AND ANALYSIS
4.1. Introduction
4.2 Demographic Profiles of Respondents
4.2 Research Questions
4.3. Testing of Research Hypothesis
4.4 Discussion of Findings
CHAPTER FIVE – SUMMARY, CONCLUSION & RECOMMENDATIONS
5.1 Introduction
5.2 Summary
5.3 Conclusion
5.4 Recommendation
REFERENCES
APPENDIX


Frequently Asked Questions | Https://eduschooler.com

Frequently Asked Questions

How do I get my choice complete project on any topic?
Simply click on the Download button above and follow the procedure stated.
I have a fresh topic that is not on your website. How do I go about it?
Chat with us on WhatsApp or contact our Instant Help Desk for a custom research project on your topic.
How fast can I get this complete project on any project topic?
Within 15 minutes if you want this exact project topic without adjustment.
Is it a complete research project or just materials?
It is a Complete Research Project i.e Chapters 1-5, Abstract, Table of Contents, Full References, Questionnaires / Secondary Data.
What if I want to change the case study for this topic?
Chat with Our Instant Help Desk Now: +234 708 7083 227 and you will be responded to immediately.
How will I get my complete project?
Your Complete Project Material will be sent to your Email Address in Ms Word document format.
Can I get my Complete Project through WhatsApp?
Yes! We can send your Complete Research Project to your WhatsApp Number.
What if my Project Supervisor made some changes to a topic I picked from your website?
Call Our Instant Help Desk Now: +234 708 7083 227 and you will be responded to immediately.
Do you assist students with Assignment and Project Proposal?
Yes! Call Our Instant Help Desk Now: +234 708 7083 227 and you will be responded to immediately.
What if I do not have any project topic idea at all?
Smiles! We've Got You Covered. Chat with us on WhatsApp Now to Get Instant Help: +234 708 7083 227.
How can I trust this site?
We are genuine and duly registered with the Corporate Affairs Commission. This site runs on Secure Sockets Layer (SSL), ensuring all transactions are highly secure and safe.
Customer Testimonials | Https://eduschooler.com

Our Customers are Happy

Ademola A.

★★★★★

I was skeptical at first, but after placing my order, my full project arrived in my email in under 15 minutes! The process was smooth, clear, and professional. Truly amazing service!

Kwabena K.

★★★★★

I needed a custom project on a new topic. Https://eduschooler.com delivered within 3 days, and the quality was outstanding. They even guided me on how to defend it. Highly recommend!

Michael H.

★★★★★

Fast, reliable, and very professional. My research project was delivered on time, with no hidden charges. The team is trustworthy and supportive.

Fatou B.

★★★★★

I got my full project in minutes and my custom request within 3 days. Their communication is clear, and the material is top-notch. Excellent experience!

James O.

★★★★★

https://eduschooler.com is a lifesaver! My project was delivered exactly as requested. The team is friendly, professional, and highly responsive. Very satisfied!

Ngozi E.

★★★★★

I was worried about paying online, but the team reassured me and delivered my complete project instantly. Transparent and professional service!

Ama S.

★★★★★

I requested a custom topic project and received it in just 3 days. The guidance and quality were excellent. I recommend eduschooler.com to everyone!

Sarah W.

★★★★★

The service is dependable and efficient. My project arrived on time, and every step was transparent. Truly a professional service I trust.

Emmanuel T.

★★★★★

Fast and reliable. My full project was delivered in minutes, and the custom project in 3 days. Communication was excellent throughout.

Aisha N.

★★★★★

Extremely satisfied with the service. My project was delivered promptly, fully transparent, and of high quality. A trustworthy academic partner!