Title :
ATM peer group leader attack and mitigation
Author :
Smith, Robert N. ; Hill, Douglas W. ; Robinson, N.P.
Author_Institution :
Motorola Inc., USA
fDate :
6/21/1905 12:00:00 AM
Abstract :
The private network to network interface (PNNI) provides routing and signalling functions in an asynchronous transfer mode (ATM) network. The routing function is based on a logical hierarchical structure to reduce the complexity for a majority of the routing nodes. The hierarchy comprises groups of nodes. Each group contains one or more logical group nodes (LGNs) which summarize routing information about their children and send (or flow) it to other LGNs. Each group also contains zero or one peer group leaders (PGL). The principal function of the PGL is the flooding of summary routing information from logical group members (LGM) to the next higher level of the hierarchy. The PGL also flows summary information it receives from the next higher level to other logical nodes. If the connectivity information in the PGL´s table changes due to malfunction or malicious action, portions of the network can be isolated from each other. When the change is due to malfunction, the normal processes for electing a new PGL will quickly remedy the problem. This paper suggests physical and logical changes to the ATM architecture to improve fault tolerance and security. The recommendations made are aimed at the peer group structure. Additional physical and logical links are recommended between logical groups to minimize the damage due to routing corruption by any single node. Also, logical procedures to recognize and remove a corrupted PGL from its position are also presented. Shadow PGL(s) are recommended to provide a fast smooth transition from one PGL to the next. A shadow PGL will also serve the purpose of providing cross checks on the information flow by the PGL and will enhance network security
Keywords :
asynchronous transfer mode; fault tolerance; network interfaces; telecommunication network routing; telecommunication security; telecommunication signalling; transport protocols; ATM architecture; ATM peer group leader attack; PNNI protocol; asynchronous transfer mode; connectivity information; fault tolerance; logical group members; logical group nodes; logical hierarchical structure; logical links; malfunction; malicious action; network routing; network security; network signalling; peer group leaders; physical links; private network to network interface; routing corruption; routing nodes; shadow PGL; summary routing information flooding; Asynchronous transfer mode; Fault tolerance; Floods; Information security; Internet; Network interfaces; Nominations and elections; Peer to peer computing; Routing protocols; Switches;
Conference_Titel :
Military Communications Conference Proceedings, 1999. MILCOM 1999. IEEE
Conference_Location :
Atlantic City, NJ
Print_ISBN :
0-7803-5538-5
DOI :
10.1109/MILCOM.1999.822780