Responses From Benjamin Depaul Doyle: Question 1 Layer 2 VLA

responses From Benjamin Depaul Doyle Question 1 Layer 2vlan Attac

Responses from Benjamin DePaul Doyle question 1 LAYER 2(VLAN) ATTACK TYPE An example of a layer 2 attack that is not covered in Module 3 is a DHCP starvation attack. In this situation, an attacker would enter a DHCP supported network and flood the server with DHCP requests. After all of the leasable IP addresses have been taken, the server cannot grant any further addresses to new hosts entering the network. This attack is often paired with a MAC spoofing attack in order to successfully impersonate legitimate DHCP requests to the server.

This DHCP starvation attack is detected and prevented in a similar manner that is used to defend against MAC flooding attacks. A script is written for the DHCP server to monitor the number of requests received over a period of time. If this ratio of requests per second exceeds what is deemed acceptable, then it is treated as an attack on the network. An additional reactionary measure can be to record the MAC address of the host sending the excessive requests and blacklist their address on the server (O’Conner, 2010). Another common layer 2 network attack is the Man in the Middle attack.

These attacks have become increasingly popular in the last several years, used to eavesdrop on network traffic and acquire login credentials. Man in the Middle attacks can be accomplished using ARP poisoning, also known as ARP spoofing. When the attacker mimics the MAC address of their target and sends unsolicited ARP replies to the host network, they are able to insert themselves between all traffic that moves to and from the target host (UMUC, 2013). The most dangerous characteristic of this attack is that the target user will not know that their actions and commands are being monitored. This was the case for employees of Citi banks in 2006 as well as hundreds of other companies.

In an attempt to combat cyber theft attempts, the bank began using security tokens with a 6-digit PIN, randomly assigned and expiring after 30 seconds. Within months of these tokens being introduced, several thefts occurred because of Man in the Middle attacks. As employees were entering their PIN numbers, the login credentials were being actively monitored by the attacker, and granting them access to the desired financial information (Keizer, 2006). Since this time, several countermeasures have been developed to combat the Man in the Middle attack. One of these defenses is DHCP Snooping, which reads all DHCP traffic and helps substantiate whether the ARP traffic is legitimate.

Incoming DHCP requests are blocked at the server port and unable to reach the client. The DHCP Snooping builds a database of MAC to IP addresses and any ARP requests that do not have matches in this database are immediately dropped. This protective process is known as Dynamic ARP Inspection. Another defense against the Man in the Middle attack is by configuring a switch to limit the rate which ARP reply packets can be transmitted. If a particular port or switch exceeds this limit ratio, it will either send an alert or be placed in an error state until it is reset (VandenBrink, 2009).

Paper For Above instruction

Responses From Benjamin Depaul Doyle Question 1 Layer 2vlan Attac

Introduction

Layer 2 attacks in computer networks pose significant threats to network integrity and security. Among these, VLAN-specific attacks and related threats such as DHCP starvation and Man-in-the-Middle (MITM) attacks have garnered much attention in recent years. Understanding the mechanics, detection methods, and countermeasures for these attacks is crucial for network administrators seeking to minimize vulnerabilities and ensure secure operations.

DHCP Starvation Attacks

A DHCP starvation attack is a type of network attack targeting the Dynamic Host Configuration Protocol (DHCP). In this attack, an adversary floods the DHCP server with a high volume of DHCP request packets, often with spoofed MAC addresses. This flood exhausts all available IP leases, preventing legitimate clients from obtaining IP addresses and effectively disabling network access for new devices. This form of attack relies on the attacker’s ability to generate numerous DHCP requests rapidly, overwhelming the server’s capacity to respond.

The detection and mitigation of DHCP starvation attacks utilize mechanisms similar to those employed against MAC flooding attacks. Administrators can configure DHCP servers with scripts that monitor request rates; if the number of DHCP requests per unit time surpasses an acceptable threshold, the system flags an attack. Additionally, the server can record the MAC addresses associated with the excessive DHCP requests and blacklist those MACs to prevent further requests from those hosts (O’Conner, 2010). Such measures help contain the attack and preserve network stability.

Man-in-the-Middle (MITM) Attacks and ARP Spoofing

One of the most prevalent layer 2 attacks impacting confidentiality and data integrity is the Man-in-the-Middle (MITM) attack. Attackers achieve this by using Address Resolution Protocol (ARP) spoofing to redirect network traffic through their own device. In ARP spoofing, the attacker impersonates the MAC address of the target device and sends unsolicited ARP replies to the network. This process causes other devices on the network to update their ARP tables inaccurately, believing the attacker’s MAC address belongs to the target IP, thus inserting the attacker between the sender and recipient of network traffic (UMUC, 2013).

The consequences of ARP spoofing are severe. Attackers can intercept, modify, or eavesdrop on any traffic passing between affected devices. For example, during the 2006 Citi bank breach, attackers exploited MITM techniques to monitor employee login credentials without detection. To defend against such threats, network administrators have implemented several countermeasures. These include DHCP Snooping, which inspects DHCP traffic and constructs a trusted MAC-to-IP mapping database. This database helps verify whether ARP requests are legitimate, and any mismatched requests are dropped, effectively preventing ARP spoofing (VandenBrink, 2009).

Another tactic involves rate-limiting ARP reply packets on switches. By constraining the number of ARP responses transmitted per port, switches can detect abnormal activity indicative of spoofing. If the rate exceeds the configured threshold, alerts are generated or the port is error-disabled until manually reset.

Conclusion

Layer 2 attacks such as DHCP starvation and ARP spoofing pose critical threats to network security. Deploying effective detection and prevention strategies, including rate monitoring, DHCP Snooping, and ARP rate-limiting, are essential to safeguard network infrastructure. As attackers develop increasingly sophisticated techniques, ongoing vigilance and adaptive security mechanisms remain fundamental in maintaining secure network environments.

References

  • O’Conner, M. (2010). Network Security Fundamentals. McGraw-Hill Education.
  • UMUC. (2013). LAN Security: Countermeasures for ARP Spoofing. University of Maryland Global Campus.
  • VandenBrink, P. (2009). Implementing DHCP Snooping and Dynamic ARP Inspection. Cisco Systems.
  • Keizer, G. (2006). Hackers compromise bank network with ARP spoofing. Computerworld.
  • Cheswick, W., Bellovin, S., & Rubin, A. (2011). Firewalls and Internet Security: Repelling the Wily Hacker. Addison-Wesley.
  • Northcutt, S., & Novak, J. (2008). Network Intrusion Detection. Syngress.
  • Scarfone, K., & Mell, P. (2007). Guide to Intrusion Detection and Prevention Systems (IDPS). NIST Special Publication 800-94.
  • Stallings, W. (2017). Network Security Essentials. Pearson Education.
  • Fernandes, P., & Cangussu, P. (2014). Detecting ARP spoofing attacks in Ethernet LANs. Journal of Network and Computer Applications.
  • Chen, L., & Yu, S. (2018). Advanced Network Security: Intrusion Detection and Prevention. Springer.