A campus network refers to a proprietary LAN (local area network) or a set of LAN’s that are interconnected that serve bodies such as corporation, government agencies, or educational institutions such as universities. The campus is a set of buildings in close proximity to each other although the end users can be dispersed more widely (geographically) but using a single LAN but they are not scattered as wide as would be in a WAN (wide area network) (Rouse, 2016). Campus Networks can be a target of various attacks; this paper discusses some possible attacks and their solutions
This is an attack type where the IP (Internet protocol) broadcast addressing is exploited and the victim is flooded with ICMP (Internet Cntrol Message Protocol) ping (echo) replies sent from another network. Using a Smurf program, attackers cause the attacked network section to become inoperable; the attack depends on an intermediary to broadcast ICMP ping packets to hosts on the target subnet within a campus network. The Smurf program creates a legitimate network packet that appears to have originated from another address; it has an ICMP ping message addressed to all IP addresses in the campus network. On arrival at the target subnet, the ICMP ping request packet is converted into a Layer 2 broadcast and then sent to connected hosts (Barrett, 2010).
The attack only becomes possible if the device (router) in a layer 2 subnet has directed forwarding of broadcasts enabled, so disabling this will stop the flooding with ICMP ping replies. Another solution is placing a box switch with the capability of DHCP snooping to discard invalid packets as a core switch within the campus network. An example is the Huawei S 6700 advanced switch (Barrett, 2010).
CDP is a commonly used tool by technicians to create a network documentation that is usually enabled by default in most switches. This can be attacked through a technique called CDP spoofing on Cisco routers, switches, or other network equipment y creating forged CDP packets impersonating other devices to compromise a campus network’s operation. And this is incredibly easy to achieve; a hacker with Kali Linux can easily spoof the CDP and compromise a network just by starting the Yersinia program in Kali Linux and clicking attack; the switch will crsh and reboot in minutes, greatly disrupting the campus network (Vonnie, 2015).
This attack can be prevented/ mitigated by placing all switch ports that are not being used in a dummy VLAN (Virtual LAN) and enable admin down. Another approach entails disabling CDP on switches and swicthports that do not need it (CDP); for instance, access points that only have an IP phone or a computer; these do not need CDP to function. The third approach is to configure proper port security on ports that cannot be disabled; using the command
Where n is the number of MAC’s so a limit can be set to say 5; this will effectively limit the number of addresses and even if Yersinia launches a flood of addresses, the switch will essentially place the port on a state of secure shutdown, preventing network interruption. In this case, the access to a switchport is confined to a specified layer 2 MAC address and this will not permit the Kali box with Yersinia to launch a CDP attack (Heygele, 2014)
Attacks to campus networks can cause great harm; some of the common and potentially destructive attacks include Smurf attacks where ICMP ping packets are used to flood a victim. This can be mitigated by disabling directed forwarding of broadcasts. Another attack that can target a layer 2 device is CDP attacks that are incredibly easy to achieve; this is mitigated by enabling switch port security
Barrett, D. (2010). CompTIA security+ SY0-201 practice questions exam cram: Exam SY0-201. [Indianapolis, Ind.], Pearson Education.
Heygele, R., 2014. Protect your network against CDP attacks! [online] Infra Blog. Available at: <https://heggel4.wordpress.com/2014/10/11/protect-your-network-against-cdp-attacks/> [Accessed 2 May 2017].
Rouse, M., 2016. What is campus network? - Definition from WhatIs.com. [online] Tech target. Available at: <https://searchsdn.techtarget.com/definition/campus-network> [Accessed 29 Apr. 2017].
Vonnie, B., 2015. Destroying a Cisco Switch with CDP Flooding. [online] fixedByVonnie. Available at: <https://www.fixedbyvonnie.com/2015/06/destroying-a-cisco-switch-with-cdp-flooding/#.WQgR_DQlHR0> [Accessed 2 May 2017].
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2018). Internet Control Message Protocol. Retrieved from https://myassignmenthelp.com/free-samples/internet-control-message-protocol.
"Internet Control Message Protocol." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/internet-control-message-protocol.
My Assignment Help (2018) Internet Control Message Protocol [Online]. Available from: https://myassignmenthelp.com/free-samples/internet-control-message-protocol
[Accessed 04 April 2020].
My Assignment Help. 'Internet Control Message Protocol' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/internet-control-message-protocol> accessed 04 April 2020.
My Assignment Help. Internet Control Message Protocol [Internet]. My Assignment Help. 2018 [cited 04 April 2020]. Available from: https://myassignmenthelp.com/free-samples/internet-control-message-protocol.
For years now, MyAssignmenthelp.com is providing affordable essay help to millions of students worldwide. Our essay assistance services have helped us in assisting students with even the toughest essay assignments. We take pride in the fact that we cater the best assistance to search terms like help me with my essay. We offer affordable services in the fastest way possible. For our fast delivering services, students trust us with their urgent essay assignment needs. Two of our most popular essay writing services are maths essay help and English essay help.
Answer: The behaviour of human beings are full of intricacies and it is highly difficult to understand or apprehend it. There are several factors that join together for determining some peculiar kinds of patterns for the employees’ behaviour in all organisation. There are certain employees who are coarse, some are amiable, some are stone hearted and many are soft hearted. Also, there are some who are empathetic or apathetic and on the ot...Read More
Answer: Claire Smithfield Lots of Stuff Park 32/A Kitchner, 45660 Subject: Regarding Use Of Social Media Dear Claire, I hope this letter finds you in good health. We received your notification regarding the use of social media and how you feel concerned for our health. I must say, on behalf of all the employees, that this was a very thoughtful gesture on your part. This makes us feel especially wanted in the company. Of the p...Read More
Answer: HBR Case Study The main conflicting issue in this given case study is based on hiring an international talent, Anne Prevost. Being particularly a German-based organisation Typware, the organisation needs to recruit a new talent which can be beneficial for the organisational current competitive market. The international and local market is different from each other. For specific, the candidate wants to settle down in Europe. The h...Read More
Answer: Part 1 Construction Law has evolved as an area of law dealing with disputes that arises in relation to the construction of buildings and other similar fields. It has been developed by bundling the laws relating to commercial law, contract law, planning law, tort law and employment law. This branch of law includes issues like negligence, contract, guarantees, claims and other similar areas of laws relating to construction (Manderson, J...Read More
Answer: Introduction This report has aimed to examine a strategic change initiative in the given organization in the case study. In this given report, Algorithm Sal has been chosen as the organization, which is a regional distributor of pharmaceutical products in Middle East, Near East, east Europe and North Africa. The organization had acquired Merck& Co. in an attempt to become the manufacture of products by establishing manufacturi...Read More
Just share your requirements and get customized solutions on time.
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
Thank you so much for your efforts the solution was perfect and submitted on time.
every thing good and Very classy treatment. thank you very much i hope do my thesis with this web
The work was well present, details and met all expectations. This is a prove that I will always use this platform and recommend this site to friends at schools and family. Keep using great people to keep having users. Just after receiving this assign...
good transcript that it make feel good because i don\'t need to worry about no ideas to write this transcript