DocumentCode :
1615097
Title :
A framework for investigating security attacks in ATM networks
Author :
Ghosh, Sumit ; Robinson, Pete
Author_Institution :
Dept. of Comput. Sci. & Eng., Arizona State Univ., Tempe, AZ, USA
Volume :
1
fYear :
1999
fDate :
6/21/1905 12:00:00 AM
Firstpage :
724
Abstract :
While the occurrence and impact of attacks launched against telephone networks, data networks, and the power grid, are widely reported in the news media, a systematic analysis of these attacks in the scientific literature is lacking. This paper presents a fundamental analysis of the state-of-the-art, ATM networks, leading to a systematic and comprehensive identification of every weakness in ATM networks that may be exploited by a perpetrator to launch security attacks. The vulnerability analysis effort builds on the fundamental framework for network security already proposed in the literature, and focuses on the four key components of ATM networks-switch fabric, call processor, ATM links, and the basic ATM operating principles. This paper identifies and describes the nature of the attacks that are capable of triggering the vulnerabilities. Most of the attacks will be synthesized specifically for every susceptibility. An attack may be viewed as a perturbation of an operationally correct ATM network. The focus is on identifying complex attacks that while based on the ATM fundamentals, are representative of those that would be construed by intelligent enemy agents. Attacks are organized into two broad categories. The first attack type focuses on failing specific, standard functions in ATM networks while the second category of attacks refers to the prescription of a malicious intent or objective. The attacks are modeled utilizing a representative, ATM network and validated through a simulation utilizing an asynchronous, distributed, and accurate ATM simulator, that executes on a network of Pentium workstations under Linux, configured as a loosely-coupled parallel processor
Keywords :
asynchronous transfer mode; computer network reliability; security of data; telecommunication security; ATM link; ATM networks; basic ATM operating principles; call processor; intelligent enemy agents; malicious intent; network security; security attacks; specific standard functions; switch fabric; vulnerability analysis; weakness; Asynchronous transfer mode; Data security; Fabrics; Intelligent agent; Linux; Network synthesis; Power grids; Power system security; Telephony; Workstations;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Military Communications Conference Proceedings, 1999. MILCOM 1999. IEEE
Conference_Location :
Atlantic City, NJ
Print_ISBN :
0-7803-5538-5
Type :
conf
DOI :
10.1109/MILCOM.1999.822779
Filename :
822779
Link To Document :
بازگشت