• DocumentCode
    1804347
  • Title

    An analysis of service degradation attacks against real-time MPLS networks

  • Author

    Al-Mutairi, Abdulrahman ; Wolthusen, Stephen D.

  • Author_Institution
    Inf. Security Group, Univ. of London, Egham, UK
  • fYear
    2013
  • fDate
    14-16 Aug. 2013
  • Firstpage
    1
  • Lastpage
    8
  • Abstract
    While the robustness of the communication network infastructure against attacks on the integrity of backbone protocols such as the Border Gateway Protocol (BGP) and MultiProtocol Label Switching (MPLS) protocols has been the subject of significant earlier work, more limited attention has been paid to the problem of availability and timeliness that is crucial for service levels needed in areas such as some financial services and particularly for the interconnection of smart grid components requiring hard real-time communication which are not necessarily over completely isolated networks. In such networks, an adversary will be successful if a targeted flow or set of flows no longer meets CoS and QoS boundaries, particularly delay and jitter, even where no outright compromise of either the flow itself or the control flow is achieved. The attacker´s objective can be accomplished by interfering with the operation of the control signalling protocol, but also by influencing the policy of MPLS nodes and the mitigation mechanisms itself. In this paper we therefore describe an adversary model and analysis of attacks based on manipulation of Label Distribution Protocol (LDP) messages for the purpose of affecting the required (QoS) and Class of Service (CoS) for a targeted traffic where the adversary may intentionally modify the policy state of LSRs that the targeted traffic passes though.
  • Keywords
    jitter; multiprotocol label switching; quality of service; signalling protocols; BGP; CoS boundaries; LDP message manipulation; MPLS protocol; QoS boundaries; adversary model; backbone protocols; border gateway protocol; class of service; communication network infastructure; control signalling protocol; delay; jitter; label distribution protocol message manipulation; mitigation mechanisms; multiprotocol label switching protocol; real-time MPLS networks; service degradation attacks; Bandwidth; Delay effects; Jitter; Multiprotocol label switching; Quality of service; Security; Adversary Modelling; Class of Service; Crippling Attacks; Denial of Service; Multiprotocol Label Switching; Quality of Service; Real-Time Networks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Security for South Africa, 2013
  • Conference_Location
    Johannesburg
  • Type

    conf

  • DOI
    10.1109/ISSA.2013.6641057
  • Filename
    6641057