DocumentCode :
1804347
Title :
An analysis of service degradation attacks against real-time MPLS networks
Author :
Al-Mutairi, Abdulrahman ; Wolthusen, Stephen D.
Author_Institution :
Inf. Security Group, Univ. of London, Egham, UK
fYear :
2013
fDate :
14-16 Aug. 2013
Firstpage :
1
Lastpage :
8
Abstract :
While the robustness of the communication network infastructure against attacks on the integrity of backbone protocols such as the Border Gateway Protocol (BGP) and MultiProtocol Label Switching (MPLS) protocols has been the subject of significant earlier work, more limited attention has been paid to the problem of availability and timeliness that is crucial for service levels needed in areas such as some financial services and particularly for the interconnection of smart grid components requiring hard real-time communication which are not necessarily over completely isolated networks. In such networks, an adversary will be successful if a targeted flow or set of flows no longer meets CoS and QoS boundaries, particularly delay and jitter, even where no outright compromise of either the flow itself or the control flow is achieved. The attacker´s objective can be accomplished by interfering with the operation of the control signalling protocol, but also by influencing the policy of MPLS nodes and the mitigation mechanisms itself. In this paper we therefore describe an adversary model and analysis of attacks based on manipulation of Label Distribution Protocol (LDP) messages for the purpose of affecting the required (QoS) and Class of Service (CoS) for a targeted traffic where the adversary may intentionally modify the policy state of LSRs that the targeted traffic passes though.
Keywords :
jitter; multiprotocol label switching; quality of service; signalling protocols; BGP; CoS boundaries; LDP message manipulation; MPLS protocol; QoS boundaries; adversary model; backbone protocols; border gateway protocol; class of service; communication network infastructure; control signalling protocol; delay; jitter; label distribution protocol message manipulation; mitigation mechanisms; multiprotocol label switching protocol; real-time MPLS networks; service degradation attacks; Bandwidth; Delay effects; Jitter; Multiprotocol label switching; Quality of service; Security; Adversary Modelling; Class of Service; Crippling Attacks; Denial of Service; Multiprotocol Label Switching; Quality of Service; Real-Time Networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Security for South Africa, 2013
Conference_Location :
Johannesburg
Type :
conf
DOI :
10.1109/ISSA.2013.6641057
Filename :
6641057
Link To Document :
بازگشت