01-24-2022 04:37 AM
Hello,
We have cisco sg300 switches (switched network/ LAN), and we are collecting interface statistics data such as in/out octet, unicast, multicast and broadcast for each switch and each port of the switch.
Can we detect sniffing attack on the switch based on those data?
Thanks in advance.
01-24-2022 04:52 AM
No you can not high level as per i know.
01-24-2022 05:24 AM
can you please explain more for us.
we searched about this topic and the result was that when data sniffing occurs an increase in data traffic appears which may help us detect it. Is this possible ?
01-24-2022 06:20 AM
when data sniffing
You mean span the port ?
01-24-2022 09:48 PM
we have 2 questions:
1.can we detect port spanning from data?
2. and can we detect any other attack from data (stealing data illegally)?
thanks.
01-25-2022 02:25 AM
1.can we detect port spanning from data?
- Sorry i may be missed here, you looking to detect is the port spanned ? or you looking to Data port to span or mirror for sniffing.
2. and can we detect any other attack from data (stealing data illegally)?
- this is depends on destination port, what software you have to detect this, you need to look more secure solution.
sg300 - your exepctation on this mode too big, so you need to consider if you really looking, then look for Cat 9K switches.
01-25-2022 05:01 AM
1. I need to detect if the port spanned.
2. can you explain more please
And if we collect switch data (in/out octet, unicast, multicast and broadcast) and plot them in a graph. Then we monitor this graphs and observe data changes can we figure out if we have any attack on the switch such as data stealing.
01-25-2022 06:18 AM
1. I need to detect if the port spanned.
- if you like to detect port is spanned, based on the config you need to do audit.
2- And if we collect switch data (in/out octet, unicast, multicast and broadcast) and plot them in a graph. Then we monitor this graphs and observe data changes can we figure out if we have any attack on the switch such as data stealing.
- No by this you will not able to find what you looking for, you need network analyser ( see your network attacked)
you will find many examples.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide