Affiliation:
1. University of London, UK
2. University of London, UK & Gjøvik University College, Norway
Abstract
Whilst the security and integrity of exterior gateway protocols such as the Border Gateway Protocol (BGP) and, to a lesser extent, interior gateway protocols, including the Multi-Protocol Label Switching (MPLS), have been investigated previously, more limited attention has been paid to the problem of availability and timeliness that is crucial for service levels needed in critical infrastructure areas such as financial services and electric power (smart grid) networks. The authors describe a method for modeling adversaries for the analysis of attacks on quality of service characteristics underpinning such real-time networks as well as a model of policies employed by MPLS routers based on simplified networks and give an analysis of attack vectors based on assumed adversaries derived from the introduced method.
Reference37 articles.
1. Agrawal, Cruz, Okino, & Rajan. (1999). Performance bonds for flow control protocols. IEEE/ACM Transactions on Networking, 7(3), 310–323.
2. Alkahtani, M. S., Woodward, M. E., & Al-Begain, K. (2003). An overview of quality of service (qos) and qos routing in communication networks. In Proceedings of 4th PGNET2003 Symposium, (pp. 236-242). Liverpool, UK: PGNET.
3. Andersson, Doolan, Feldman, Fredette, & Thomas. (2007). LDP specification. IETF, RFC 5036.
4. Fixed priority pre-emptive scheduling: An historical perspective
5. Awduche & Agogbua. (1999). Requirements for traffic engineering over mpls. IETF, RFC 2702.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Malicious MPLS Policy Engine Reconnaissance;Advanced Information Systems Engineering;2014