{"title":"用于调查ATM网络中的安全攻击的框架","authors":"S. Ghosh, P. Robinson","doi":"10.1109/MILCOM.1999.822779","DOIUrl":null,"url":null,"abstract":"While the occurrence and impact of attacks launched against telephone networks, data networks, and the power grid, are widely reported in the news media, a systematic analysis of these attacks in the scientific literature is lacking. This paper presents a fundamental analysis of the state-of-the-art, ATM networks, leading to a systematic and comprehensive identification of every weakness in ATM networks that may be exploited by a perpetrator to launch security attacks. The vulnerability analysis effort builds on the fundamental framework for network security already proposed in the literature, and focuses on the four key components of ATM networks-switch fabric, call processor, ATM links, and the basic ATM operating principles. This paper identifies and describes the nature of the attacks that are capable of triggering the vulnerabilities. Most of the attacks will be synthesized specifically for every susceptibility. An attack may be viewed as a perturbation of an operationally correct ATM network. The focus is on identifying complex attacks that while based on the ATM fundamentals, are representative of those that would be construed by intelligent enemy agents. Attacks are organized into two broad categories. The first attack type focuses on failing specific, standard functions in ATM networks while the second category of attacks refers to the prescription of a malicious intent or objective. The attacks are modeled utilizing a representative, ATM network and validated through a simulation utilizing an asynchronous, distributed, and accurate ATM simulator, that executes on a network of Pentium workstations under Linux, configured as a loosely-coupled parallel processor.","PeriodicalId":334957,"journal":{"name":"MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1999-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A framework for investigating security attacks in ATM networks\",\"authors\":\"S. Ghosh, P. Robinson\",\"doi\":\"10.1109/MILCOM.1999.822779\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"While the occurrence and impact of attacks launched against telephone networks, data networks, and the power grid, are widely reported in the news media, a systematic analysis of these attacks in the scientific literature is lacking. This paper presents a fundamental analysis of the state-of-the-art, ATM networks, leading to a systematic and comprehensive identification of every weakness in ATM networks that may be exploited by a perpetrator to launch security attacks. The vulnerability analysis effort builds on the fundamental framework for network security already proposed in the literature, and focuses on the four key components of ATM networks-switch fabric, call processor, ATM links, and the basic ATM operating principles. This paper identifies and describes the nature of the attacks that are capable of triggering the vulnerabilities. Most of the attacks will be synthesized specifically for every susceptibility. An attack may be viewed as a perturbation of an operationally correct ATM network. The focus is on identifying complex attacks that while based on the ATM fundamentals, are representative of those that would be construed by intelligent enemy agents. Attacks are organized into two broad categories. The first attack type focuses on failing specific, standard functions in ATM networks while the second category of attacks refers to the prescription of a malicious intent or objective. The attacks are modeled utilizing a representative, ATM network and validated through a simulation utilizing an asynchronous, distributed, and accurate ATM simulator, that executes on a network of Pentium workstations under Linux, configured as a loosely-coupled parallel processor.\",\"PeriodicalId\":334957,\"journal\":{\"name\":\"MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)\",\"volume\":\"20 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1999-10-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MILCOM.1999.822779\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MILCOM.1999.822779","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A framework for investigating security attacks in ATM networks
While the occurrence and impact of attacks launched against telephone networks, data networks, and the power grid, are widely reported in the news media, a systematic analysis of these attacks in the scientific literature is lacking. This paper presents a fundamental analysis of the state-of-the-art, ATM networks, leading to a systematic and comprehensive identification of every weakness in ATM networks that may be exploited by a perpetrator to launch security attacks. The vulnerability analysis effort builds on the fundamental framework for network security already proposed in the literature, and focuses on the four key components of ATM networks-switch fabric, call processor, ATM links, and the basic ATM operating principles. This paper identifies and describes the nature of the attacks that are capable of triggering the vulnerabilities. Most of the attacks will be synthesized specifically for every susceptibility. An attack may be viewed as a perturbation of an operationally correct ATM network. The focus is on identifying complex attacks that while based on the ATM fundamentals, are representative of those that would be construed by intelligent enemy agents. Attacks are organized into two broad categories. The first attack type focuses on failing specific, standard functions in ATM networks while the second category of attacks refers to the prescription of a malicious intent or objective. The attacks are modeled utilizing a representative, ATM network and validated through a simulation utilizing an asynchronous, distributed, and accurate ATM simulator, that executes on a network of Pentium workstations under Linux, configured as a loosely-coupled parallel processor.