• DocumentCode
    1615097
  • Title

    A framework for investigating security attacks in ATM networks

  • Author

    Ghosh, Sumit ; Robinson, Pete

  • Author_Institution
    Dept. of Comput. Sci. & Eng., Arizona State Univ., Tempe, AZ, USA
  • Volume
    1
  • fYear
    1999
  • fDate
    6/21/1905 12:00:00 AM
  • Firstpage
    724
  • Abstract
    While the occurrence and impact of attacks launched against telephone networks, data networks, and the power grid, are widely reported in the news media, a systematic analysis of these attacks in the scientific literature is lacking. This paper presents a fundamental analysis of the state-of-the-art, ATM networks, leading to a systematic and comprehensive identification of every weakness in ATM networks that may be exploited by a perpetrator to launch security attacks. The vulnerability analysis effort builds on the fundamental framework for network security already proposed in the literature, and focuses on the four key components of ATM networks-switch fabric, call processor, ATM links, and the basic ATM operating principles. This paper identifies and describes the nature of the attacks that are capable of triggering the vulnerabilities. Most of the attacks will be synthesized specifically for every susceptibility. An attack may be viewed as a perturbation of an operationally correct ATM network. The focus is on identifying complex attacks that while based on the ATM fundamentals, are representative of those that would be construed by intelligent enemy agents. Attacks are organized into two broad categories. The first attack type focuses on failing specific, standard functions in ATM networks while the second category of attacks refers to the prescription of a malicious intent or objective. The attacks are modeled utilizing a representative, ATM network and validated through a simulation utilizing an asynchronous, distributed, and accurate ATM simulator, that executes on a network of Pentium workstations under Linux, configured as a loosely-coupled parallel processor
  • Keywords
    asynchronous transfer mode; computer network reliability; security of data; telecommunication security; ATM link; ATM networks; basic ATM operating principles; call processor; intelligent enemy agents; malicious intent; network security; security attacks; specific standard functions; switch fabric; vulnerability analysis; weakness; Asynchronous transfer mode; Data security; Fabrics; Intelligent agent; Linux; Network synthesis; Power grids; Power system security; Telephony; Workstations;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Military Communications Conference Proceedings, 1999. MILCOM 1999. IEEE
  • Conference_Location
    Atlantic City, NJ
  • Print_ISBN
    0-7803-5538-5
  • Type

    conf

  • DOI
    10.1109/MILCOM.1999.822779
  • Filename
    822779