Nt1330 Unit 1 Review Paper

Improved Essays
In the paper, [1], the author introduced two kinds of topology attacks focus on the architecture of SDN and emphasized the weakness of the host tracking service and the link discovery service. And then, the paper provides the security extension, called Topoguard, for the Floodlight v0.9 controller.
A. Two topology attacks
The first attack as we mentioned, Host Location Hijacking Attack, is to send a fake request that the target host migrates to a new location trying to intercept packets and connections to the target host. This attack uses the weakness of the host tracking service that the controller simply follows the latest Packet-in message and does not check the identity of the request. Once the attacker send request with the same MAC
…show more content…
This kind of attack uses the weakness of the mechanism of link discovery service that the host can involve into the link discovery operation. The general operation of finding internal link is following: At the first, after initialization, the controller contributes connection to all switches, while the internal link between switches is unknown. In order to find internal link, the controller will send the Packet-out message with the payload of LLDP packets to switches; Secondly, the switch will flood the LLDP packets to all enabled ports; Thirdly, when another switch receives the LLDP packets, it will send the Packet-in message with the payload of LLDP packets to the controller. Under this procedure, the switch cannot prevent the host to get the LLDP packet. However, if the host can reach two switches, the host can act as the transparent cable or wire to let the LLDP packet pass through. For the behavior, the host can inject the modified LLDP packet into the network or relay the original LLDP packet into another switch. As the result, when a switch receives the LLDP packet, the controller will receive a Packet-in message with the LLDP payload to show there is a link between two switches. Nevertheless, the link is the compromised host

Related Documents

  • Improved Essays

    Nt1310 Unit 1 Case Study

    • 1039 Words
    • 5 Pages

    Amazon 5 Bullet Points: MONITOR LOVED ONES OR PATIENTS REMOTELY: Receive instant alerts when a loved one or patient exits the chair to enabling you to provide immediate assistance to reduce falls and prevent injuries. EASY SET UP: Easy to use sensor pad connection is wireless for convenience and portability for use in different settings. Alarm is easily reset by reapplying pressure to the sensor pad or turning off the alarm setting. COMFORTABLE WATERPROOF PAD:…

    • 1039 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 4 Case Study

    • 424 Words
    • 2 Pages

    Utilizing the information from the table above the mean, median and standard deviation will be calculated. The mean equals the average of the sample by adding all the values of the samples and then dividing by the total number of items. The mean for the samples collected is 14.87 ounces which rounded up 14.9 ounces.…

    • 424 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    1. Name two creatures that have been discovered since you were born. Titi Monkey and Dumbo Octopus have been discovered since I was born. 2. How tall would a redwood be compared to you right now?…

    • 317 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Offic365 upgrade pitfalls. • Outdated versions of MAC OS are not supported, example: The Office365 installer will not run successfully on any MAC OS older than El Capitan. –– The solution here would be to coordinate with Phil and John to back up the user’s files and upgrade the device. • In most instances, MAC OS needs updates applied before Office365 installer can run successfully. - Solution: If the installation fails, we will need to perform the OS updates then reattempt the installation/upgrade • MAC OS version: El Capitan required disk permission repairs for Office365 software activation to be successful.…

    • 415 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The new Mercedes-AMG GLC 63 has been spotted on mule testing recently almost undisguised. This trim is going to join compact SUV competition on auto market. Even though the details are not complete yet, there are several changes found on the tested vehicle. Here is the update on it. Power and Specs Under that long hood, the SUV will be empowered by twin turbocharged V8 4.0 liter engine that produces up to 503 hp of power output with 516 lb-ft of torque performance.…

    • 401 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Hi Marcos, That's no problem; I'm always happy to help! You can access and download the required files using the credential's below. Once you access the FTP server, you will find a “FreeFlyer_Releases” folder that contains the most recent version of FreeFlyer, FreeFlyer 7.1.1. Within that subfolder you can select the bitness version installed on your system and access the "Extras" folder. Once you're in the folder then you will find a "Network Licensing" folder that will contain an lmadmin folder from which you can download and save freeflyr.exe to your system.…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Nt1330 Unit 5 Test Paper

    • 597 Words
    • 3 Pages

    I have also referred to this link on how to setup my ether channel on my network. I have used PAGP protocol and same settings on both switches involved in the ether channel link. refer to(http://www.mcmcse.com/cisco/guides/etherchannel.shtml) Francisco third year student very helpful attitude through https://www.cctmoodle.com/mod/forum/view.php?id=13260 ether channel on these ports will load balance traffic between links this means that each link is responsible for the same transferring of information instead of just loading one link with a lot of traffic. Refer to(http://www.techrepublic.com/blog/data-center/increase-network-bandwidth-using-ciscos-etherchannel/)…

    • 597 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    Nt1330 Unit 3

    • 1174 Words
    • 5 Pages

    Secure Shell (SSH) In this paper, I will discuss the network protocol Secure shell, better known as SSH. Interest in choosing this protocol came from my frequent use of SSH to run applications on the remote servers in Coover Hall. Because of this, I will be exploring the details on how the protocol works, vulnerabilities associated with it and mitigation techniques put in place to counter attacks. SSH is a Cryptographic Network Protocol created to replace Telnet.…

    • 1174 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    Nt1330 Unit 1 Term Paper

    • 455 Words
    • 2 Pages

    5.2.3Direct Access DirectAccess is new to the Windows 7 operating systems. DirectAccess enables a remote user to work on their corporate network when they are away from the office without the need of a VPN. As long as the remote user is connected to the Internet, DirectAccess will automatically connect the remote user to the corporate network without the need of any user intervention.…

    • 455 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 9 Final Paper

    • 354 Words
    • 2 Pages

    HIE provides the capability to electronically move clinical information among disparate healthcare information systems, and maintain the meaning of the information being exchanged. (HIMSS Dictionary of Healthcare Information Technology Terms, Acronyms and Organizations, Third Edition) 11)) 1) 1. What sorts of HIEs are there? 2. How are protection and security of patient wellbeing data guaranteed?…

    • 354 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Task 1 In Unix/Linux operating system a user can have root access or not, the root access provides complete access to user of a system. There are some following risks to have a single root user on Unix/Linux operating system. Easy to hack: If any security error broke the security then a hacker can get the access of all data and can get the whole control of hardware. It allow to retrieve all files and data without root access.…

    • 1228 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    That is you can directly sync the files to another person’s computer while sharing files via Dropbox and you’re on the same…

    • 457 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    ASSIGNMENT QUESTIONS: 1. What is the regulation or law that you would propose? Be very specific in the wording. (This will be your own idea and written in your own words). (20 points) Answer:…

    • 672 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Introduction Often, team members of both Apple and Microsoft convocate to ameliorate the upcoming operating system that they plan to release in a certain period of time. Many different features are added to technology each day to facilitate the use of it. For example, Cortana (the Windows Phone Assistant), the Snap Assist feature on Microsoft, and Phone Companion are qualities that aid the success of an operating system. In Apple, features such as Control center, Task manager and fingerprints contribute to the success in IOS Seven. I will be discussing the advantages of Cortana (the Windows Phone Assistant), the Snap Assist feature on Microsoft, and Phone Companion.…

    • 682 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    A distributed denial of service attacks advises every single composed framework to send a surge of requests…

    • 364 Words
    • 2 Pages
    Improved Essays