A framework for investigating security attacks in ATM networks

S. Ghosh, P. Robinson
{"title":"A framework for investigating security attacks in ATM networks","authors":"S. Ghosh, P. Robinson","doi":"10.1109/MILCOM.1999.822779","DOIUrl":null,"url":null,"abstract":"While the occurrence and impact of attacks launched against telephone networks, data networks, and the power grid, are widely reported in the news media, a systematic analysis of these attacks in the scientific literature is lacking. This paper presents a fundamental analysis of the state-of-the-art, ATM networks, leading to a systematic and comprehensive identification of every weakness in ATM networks that may be exploited by a perpetrator to launch security attacks. The vulnerability analysis effort builds on the fundamental framework for network security already proposed in the literature, and focuses on the four key components of ATM networks-switch fabric, call processor, ATM links, and the basic ATM operating principles. This paper identifies and describes the nature of the attacks that are capable of triggering the vulnerabilities. Most of the attacks will be synthesized specifically for every susceptibility. An attack may be viewed as a perturbation of an operationally correct ATM network. The focus is on identifying complex attacks that while based on the ATM fundamentals, are representative of those that would be construed by intelligent enemy agents. Attacks are organized into two broad categories. The first attack type focuses on failing specific, standard functions in ATM networks while the second category of attacks refers to the prescription of a malicious intent or objective. The attacks are modeled utilizing a representative, ATM network and validated through a simulation utilizing an asynchronous, distributed, and accurate ATM simulator, that executes on a network of Pentium workstations under Linux, configured as a loosely-coupled parallel processor.","PeriodicalId":334957,"journal":{"name":"MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1999-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MILCOM.1999.822779","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

While the occurrence and impact of attacks launched against telephone networks, data networks, and the power grid, are widely reported in the news media, a systematic analysis of these attacks in the scientific literature is lacking. This paper presents a fundamental analysis of the state-of-the-art, ATM networks, leading to a systematic and comprehensive identification of every weakness in ATM networks that may be exploited by a perpetrator to launch security attacks. The vulnerability analysis effort builds on the fundamental framework for network security already proposed in the literature, and focuses on the four key components of ATM networks-switch fabric, call processor, ATM links, and the basic ATM operating principles. This paper identifies and describes the nature of the attacks that are capable of triggering the vulnerabilities. Most of the attacks will be synthesized specifically for every susceptibility. An attack may be viewed as a perturbation of an operationally correct ATM network. The focus is on identifying complex attacks that while based on the ATM fundamentals, are representative of those that would be construed by intelligent enemy agents. Attacks are organized into two broad categories. The first attack type focuses on failing specific, standard functions in ATM networks while the second category of attacks refers to the prescription of a malicious intent or objective. The attacks are modeled utilizing a representative, ATM network and validated through a simulation utilizing an asynchronous, distributed, and accurate ATM simulator, that executes on a network of Pentium workstations under Linux, configured as a loosely-coupled parallel processor.
用于调查ATM网络中的安全攻击的框架
虽然针对电话网络、数据网络和电网的攻击的发生和影响在新闻媒体上得到了广泛报道,但在科学文献中缺乏对这些攻击的系统分析。本文对最先进的ATM网络进行了基本分析,从而系统全面地识别了ATM网络中可能被犯罪者利用来发动安全攻击的每一个弱点。漏洞分析工作建立在文献中已经提出的网络安全基本框架的基础上,重点关注ATM网络的四个关键组成部分——交换结构、呼叫处理器、ATM链路和ATM基本操作原理。本文识别并描述了能够触发漏洞的攻击的性质。大多数攻击将针对每种易感性专门合成。攻击可以看作是对正常运行的ATM网络的扰动。重点是识别复杂的攻击,这些攻击虽然基于ATM的基本原理,但却代表了那些可能被智能敌方特工解释的攻击。攻击分为两大类。第一种攻击类型侧重于破坏ATM网络中的特定标准功能,而第二类攻击是指恶意意图或目标的规定。这些攻击利用一个代表性的ATM网络进行建模,并通过利用异步、分布式和精确的ATM模拟器进行仿真验证,该模拟器在Linux下的Pentium工作站网络上执行,配置为松耦合并行处理器。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信