Mitigating CAM-table overflow attacks