A Security Analysis of MPLS Service Degradation Attacks Based on Restricted Adversary Models

A Security Analysis of MPLS Service Degradation Attacks Based on Restricted Adversary Models

Abdulrahman Al-Mutairi (University of London, UK) and Stephen D. Wolthusen (University of London, UK & Gjøvik University College, Norway)
Copyright: © 2014 |Pages: 22
DOI: 10.4018/978-1-4666-6158-5.ch008
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Whilst the security and integrity of exterior gateway protocols such as the Border Gateway Protocol (BGP) and, to a lesser extent, interior gateway protocols, including the Multi-Protocol Label Switching (MPLS), have been investigated previously, more limited attention has been paid to the problem of availability and timeliness that is crucial for service levels needed in critical infrastructure areas such as financial services and electric power (smart grid) networks. The authors describe a method for modeling adversaries for the analysis of attacks on quality of service characteristics underpinning such real-time networks as well as a model of policies employed by MPLS routers based on simplified networks and give an analysis of attack vectors based on assumed adversaries derived from the introduced method.
Chapter Preview
Top

As our work is motivated by the notion of mapping the QoS requirements which is mainly defined by hard real-time characteristics into the underlying networks for a well defined security analysis, we find that works addressing the availability and functionality of real-time networks are closely related. Indeed, a well designed real-time network that is capable of processing real-time traffic efficiently requires well studied and analyzed techniques to make sure all of the components in such networks act consistently and accordingly.

Yerraballi (Yerraballi and Mukkamalla, 1996) presented a way to analyze real time systems ability to meet the deadlines of tasks; particularly, by addressing the problem of end-to-end schedulability in distributed real-time system. Some of the concerns were discussed in the case that execution time changes (e.g arrival changes) in fixed priority scheduling environment. Alternatively, Thiele (Thiele, Chakraborty, & Naedele, 2000) presented a performance analysis approach using real time calculus which extends the basic concepts of network calculus. Basically, the presented method is aimed to analyze the flow of event streams through a network of computation and communication resources in any event stream environment.

Complete Chapter List

Search this Book:
Reset