A campus network refers to a proprietary LAN (local area network) or a set of LAN’s that are interconnected that serve bodies such as corporation, government agencies, or educational institutions such as universities. The campus is a set of buildings in close proximity to each other although the end users can be dispersed more widely (geographically) but using a single LAN but they are not scattered as wide as would be in a WAN (wide area network) (Rouse, 2016). Campus Networks can be a target of various attacks; this paper discusses some possible attacks and their solutions
This is an attack type where the IP (Internet protocol) broadcast addressing is exploited and the victim is flooded with ICMP (Internet Cntrol Message Protocol) ping (echo) replies sent from another network. Using a Smurf program, attackers cause the attacked network section to become inoperable; the attack depends on an intermediary to broadcast ICMP ping packets to hosts on the target subnet within a campus network. The Smurf program creates a legitimate network packet that appears to have originated from another address; it has an ICMP ping message addressed to all IP addresses in the campus network. On arrival at the target subnet, the ICMP ping request packet is converted into a Layer 2 broadcast and then sent to connected hosts (Barrett, 2010).
The attack only becomes possible if the device (router) in a layer 2 subnet has directed forwarding of broadcasts enabled, so disabling this will stop the flooding with ICMP ping replies. Another solution is placing a box switch with the capability of DHCP snooping to discard invalid packets as a core switch within the campus network. An example is the Huawei S 6700 advanced switch (Barrett, 2010).
CDP is a commonly used tool by technicians to create a network documentation that is usually enabled by default in most switches. This can be attacked through a technique called CDP spoofing on Cisco routers, switches, or other network equipment y creating forged CDP packets impersonating other devices to compromise a campus network’s operation. And this is incredibly easy to achieve; a hacker with Kali Linux can easily spoof the CDP and compromise a network just by starting the Yersinia program in Kali Linux and clicking attack; the switch will crsh and reboot in minutes, greatly disrupting the campus network (Vonnie, 2015).
This attack can be prevented/ mitigated by placing all switch ports that are not being used in a dummy VLAN (Virtual LAN) and enable admin down. Another approach entails disabling CDP on switches and swicthports that do not need it (CDP); for instance, access points that only have an IP phone or a computer; these do not need CDP to function. The third approach is to configure proper port security on ports that cannot be disabled; using the command
Where n is the number of MAC’s so a limit can be set to say 5; this will effectively limit the number of addresses and even if Yersinia launches a flood of addresses, the switch will essentially place the port on a state of secure shutdown, preventing network interruption. In this case, the access to a switchport is confined to a specified layer 2 MAC address and this will not permit the Kali box with Yersinia to launch a CDP attack (Heygele, 2014)
Attacks to campus networks can cause great harm; some of the common and potentially destructive attacks include Smurf attacks where ICMP ping packets are used to flood a victim. This can be mitigated by disabling directed forwarding of broadcasts. Another attack that can target a layer 2 device is CDP attacks that are incredibly easy to achieve; this is mitigated by enabling switch port security
Barrett, D. (2010). CompTIA security+ SY0-201 practice questions exam cram: Exam SY0-201. [Indianapolis, Ind.], Pearson Education.
Heygele, R., 2014. Protect your network against CDP attacks! [online] Infra Blog. Available at: <https://heggel4.wordpress.com/2014/10/11/protect-your-network-against-cdp-attacks/> [Accessed 2 May 2017].
Rouse, M., 2016. What is campus network? - Definition from WhatIs.com. [online] Tech target. Available at: <https://searchsdn.techtarget.com/definition/campus-network> [Accessed 29 Apr. 2017].
Vonnie, B., 2015. Destroying a Cisco Switch with CDP Flooding. [online] fixedByVonnie. Available at: <https://www.fixedbyvonnie.com/2015/06/destroying-a-cisco-switch-with-cdp-flooding/#.WQgR_DQlHR0> [Accessed 2 May 2017].
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2018). Internet Control Message Protocol. Retrieved from https://myassignmenthelp.com/free-samples/internet-control-message-protocol.
"Internet Control Message Protocol." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/internet-control-message-protocol.
My Assignment Help (2018) Internet Control Message Protocol [Online]. Available from: https://myassignmenthelp.com/free-samples/internet-control-message-protocol
[Accessed 05 March 2021].
My Assignment Help. 'Internet Control Message Protocol' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/internet-control-message-protocol> accessed 05 March 2021.
My Assignment Help. Internet Control Message Protocol [Internet]. My Assignment Help. 2018 [cited 05 March 2021]. Available from: https://myassignmenthelp.com/free-samples/internet-control-message-protocol.
For years now, MyAssignmenthelp.com is providing affordable essay help to millions of students worldwide. Our essay assistance services have helped us in assisting students with even the toughest essay assignments. We take pride in the fact that we cater the best assistance to search terms like help me with my essay. We offer affordable services in the fastest way possible. For our fast delivering services, students trust us with their urgent essay assignment needs. Two of our most popular essay writing services are maths essay help and English essay help.
Answer: Question 1 The key objective here is to offer advice to client for the likely tax implication in the wake of the various transactions which are acted on behalf of the taxpayer during assessment year. The factual information indicates that client does not perform transaction for deriving ordinary income from business course as she has not run a business of trading assets. Therefore, the scope of the taxation rests on the capital receip...
Read MoreAnswer Section A – which is about you? 1. Professionals such as early childhood educators are required to reflect on their professional experience, so that; they become aware of their strengths and weaknesses. Such reflection can be made in number of ways such as by using the Gibbs’ Reflective Model and SCOT analysis. Gibbs’ Model is distributed along five stages such as Description, Feelings, Evaluation, Conclusions and Act...
Read MoreAnswer: Introduction Cummings, (2015) argues that, the Mexican-American war refers to the fight between the United States and Mexico. From history, this war can be traced between 184 to 1848. The primary cause of this war is the matter of boundary. The United States of America wanted to extend its limit on the North American continent. It was the American perception that they have the right from Almighty God to expand their country’s te...
Read MoreAnswer: Introduction This provides a brief summary of the details of the system and the users and how the two are interacting together. This requires a set of some more specialized connectors and the symbols. Use case diagram represents a scenario in which the system application is interacting with people and the whole organization at large. The scope and the goals are also well explained here ( Seidl, Scholz, Huemer and Kappel, 2...
Read MoreAnswer: 2.1 Stages of menu product development and planning1. Idea generation SWOT of Royal Berkshire Hotel Strengths · Brand recognition · Quality food and beverages served to the clients · Enhanced quality of operations · Loyalty of the customers (Wei, Yi and Guo 2014) Weaknesses · Higher dependency on the suppliers · ...
Read MoreJust share requirement and get customized Solution.
Orders
Overall Rating
Experts
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat. If you are unable to calculate word count online, ask our customer executives.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
very good, i don't have to say . ;-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------...
Australia
Thank you so much! it helpful to pull my grade up. I wouldn't be known without these my grade will be fail with the essay but with these sure save my grade !!
Australia
I got 82% on my assignment however, my subject was quite difficult for many people; therefore I\'m satisfied with the associate that did my work ! I would definitely continue to use this platform.
Australia
I got 80% on my assignment however, my subject was quite difficult for many people; therefore I\'m satisfied with the associate that did my work ! I would definitely continue to use this platform.
Australia