词条 | Broadcast radiation |
释义 |
CausesMost commonly the cause is a switching loop in the Ethernet wiring topology (i.e. two or more paths exist between end stations). As broadcasts and multicasts are forwarded by switches out of every port, the switch or switches will repeatedly rebroadcast broadcast messages and flood the network. Since the Layer 2 header does not support a time to live (TTL) value, if a frame is sent into a looped topology, it can loop forever. In some cases, a broadcast storm can be instigated for the purpose of a denial of service (DOS) using one of the packet amplification attacks, such as the smurf attack or fraggle attack, where smurf sends a large amount of ICMP Echo Requests (ping) traffic to a broadcast address, with each ICMP Echo packet containing the spoof source address of the victim host. When the spoofed packet arrives at the destination network, all hosts on the network reply to the spoofed address. The initial Echo Request is multiplied by the number of hosts on the network. This generates a storm of replies to the victim host tying up network bandwidth, using up CPU resources or possibly crashing the victim.[3] In wireless networks a disassociation packet spoofed with the source to that of the wireless access point and sent to the broadcast address can generate a disassociation broadcast DOS attack.[4] Prevention
MANET broadcast stormsIn a mobile ad hoc network (MANET), route request (RREQ) packets are usually broadcast to discover new routes. These RREQ packets may cause broadcast storms and compete over the channel with data packets. One approach to alleviate the broadcast storm problem is to inhibit some hosts from rebroadcasting to reduce the redundancy, and thus contention and collision.[5] References1. ^{{cite web |url=http://docwiki.cisco.com/wiki/Internetwork_Design_Guide |title=Internetwork Design Guide -- Broadcasts in Switched LAN Internetworks |publisher=Cisco|date=1999}} 2. ^{{citation |url=http://foldoc.org/Chernobyl+packet |title=Chernobyl packet |publisher=Free On-line Dictionary of Computing |accessdate=2013-08-30}} 3. ^{{cite web |title=Defense Against the DoS/DDoS Attacks on Cisco Routers |url=http://www.securitydocs.com:80/library/2553 |date=17 September 2004 |first=Hang |last=Chau |archiveurl=https://web.archive.org/web/20061211033218/http://www.securitydocs.com/library/2553 |archivedate=11 December 2006 |deadurl=yes |df= }} 4. ^{{cite web |title=Disassociation Broadcast Attack Using ESSID Jack |url=http://manageengine.adventnet.com:80/products/wifi-manager/disassociation-broadcast-attack.html |archiveurl=https://web.archive.org/web/20061211001411/http://manageengine.adventnet.com/products/wifi-manager/disassociation-broadcast-attack.html |archivedate=11 December 2006 |deadurl=yes |df= }} 5. ^{{cite journal |title=The Broadcast Storm Problem in a Mobile Ad Hoc Network |url=http://www.cs.berkeley.edu/~culler/cs294-f03/papers/bcast-storm.pdf ||first1=Sze-Yao |last1=Ni |first2=Yu-Chee |last2=Tseng |first3=Yuh-Shyan |last3=Chen |first4=Jang-Ping |last4=Sheu |work=MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking |pages=151-162|location=Seattle, Washington, USA |date= August 1999}} 4 : Network performance|Network topology|Denial-of-service attacks|Wireless networking |
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。