Posts

Showing posts with the label attacks

The Spanning Tree Protocol (STP) Attacks (Layer 2) + Understand the Basics

Image
Spanning Tree Protocol (TP) is a network layer protocol that aids in the creation of a logical loop-free topology for ethernet networks. With the passage of time, several improved implementations of STP entered the industry, introducing new changes to the protocol: 802.1D / STP (Original STP) PVST+ is a combination of PVST and PVST (Cisco improvements of STP, adding a per VLAN feature) 802.1W / RSTP (Improved STP with much faster convergence) Rapid PVST+ (Cisco improvement of RSTP, adding per VLAN feature)     ON THIS PAGE: The Spanning Tree Protocol (STP) Attacks (Layer 2) + Understand the Basics STP Varieties Understanding the Differences Between 802.1D and 802.1Q Common STP Recognizing 802.1w Rapid STP Understanding Multiple STP in 802.1s More Information about STP Operation Timers for the Entire Network STP and BroadCast Storm Broadcast Storm (Scenario 1) Scenario 2: Packets that are duplic

Using network feature virtualization to mitigate DDoS attacks

Image
DDoS assaults are more than an inconvenience; they halt activities and result in substantial direct and indirect expenses for those that are impacted. Every day, over 23,000 DDoS attacks are registered, leaving businesses with disrupted online services. New Zealand's Stock Exchange (NZX) was recently struck by a massive DDoS assault for four days in a row, resulting in a stock market shutdown that prevented several people from trading.   Ways to Prevent DDoS Attack DDoS Though DDoS attacks like the one in New Zealand don't directly threaten communication service providers (CSPs), CSP systems are collateral damage when attacks move through their networks on their way to their intended victims. Due to failures of routers, servers, and other network components, bursts of excessive DDoS traffic will prevent service distribution and also result in high infrastructure costs. For both CSPs and businesses, there are currently two traditiona

Using network feature virtualization to mitigate DDoS attacks

Image
DDoS assaults are more than an inconvenience; they halt activities and result in substantial direct and indirect expenses for those that are impacted. Every day, over 23,000 DDoS attacks are registered, leaving businesses with disrupted online services. New Zealand's Stock Exchange (NZX) was recently struck by a massive DDoS assault for four days in a row, resulting in a stock market shutdown that prevented several people from trading.   Ways to Prevent DDoS Attack DDoS Though DDoS attacks like the one in New Zealand don't directly threaten communication service providers (CSPs), CSP systems are collateral damage when attacks move through their networks on their way to their intended victims. Due to failures of routers, servers, and other network components, bursts of excessive DDoS traffic will prevent service distribution and also result in high infrastructure costs. For both CSPs and businesses, there are currently two traditiona

The Spanning Tree Protocol (STP) Attacks (Layer 2) + Understand the Basics

Image
Spanning Tree Protocol (TP) is a network layer protocol that aids in the creation of a logical loop-free topology for ethernet networks. With the passage of time, several improved implementations of STP entered the industry, introducing new changes to the protocol: 802.1D / STP (Original STP) PVST+ is a combination of PVST and PVST (Cisco improvements of STP, adding a per VLAN feature) 802.1W / RSTP (Improved STP with much faster convergence) Rapid PVST+ (Cisco improvement of RSTP, adding per VLAN feature)     ON THIS PAGE: The Spanning Tree Protocol (STP) Attacks (Layer 2) + Understand the Basics STP Varieties Understanding the Differences Between 802.1D and 802.1Q Common STP Recognizing 802.1w Rapid STP Understanding Multiple STP in 802.1s More Information about STP Operation Timers for the Entire Network STP and BroadCast Storm Broadcast Storm (Scenario 1) Scenario 2: Packets that are duplicat

The Spanning Tree Protocol (STP) Attacks (Layer 2) + Understand the Basics

Image
Spanning Tree Protocol (TP) is a network layer protocol that aids in the creation of a logical loop-free topology for ethernet networks. With the passage of time, several improved implementations of STP entered the industry, introducing new changes to the protocol: 802.1D / STP (Original STP) PVST+ is a combination of PVST and PVST (Cisco improvements of STP, adding a per VLAN feature) 802.1W / RSTP (Improved STP with much faster convergence) Rapid PVST+ (Cisco improvement of RSTP, adding per VLAN feature)     ON THIS PAGE: The Spanning Tree Protocol (STP) Attacks (Layer 2) + Understand the Basics STP Varieties Understanding the Differences Between 802.1D and 802.1Q Common STP Recognizing 802.1w Rapid STP Understanding Multiple STP in 802.1s More Information about STP Operation Timers for the Entire Network STP and BroadCast Storm Broadcast Storm (Scenario 1) Scenario 2: Packets that are duplic