13.09.2014 Views

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

22. If SWAP considerations permit, an NIDS should be deployed that is associated with the<br />

firewall system. The NIDS should be configured to recognize attack footpr<strong>in</strong>ts and be<br />

configurable to optionally send alerts to designated crew members or ground systems<br />

alert<strong>in</strong>g them should certa<strong>in</strong> types of attacks occur.<br />

23. The ASBR provides BGP connectivity with the remote air and ground networks with<br />

which the airplane is communicat<strong>in</strong>g. The airplane’s ASBR must be configured such that<br />

all packets are sent with an ASBR <strong>in</strong>terface, because the IP dest<strong>in</strong>ation address must be<br />

dropped unless they use IPsec <strong>in</strong> transport mode and come from a network management<br />

or IDS device that is local to that airplane.<br />

24. DO-178B should be extended to mitigate network attack vulnerabilities by <strong>in</strong>troduc<strong>in</strong>g<br />

specific tests <strong>in</strong>to the development processes (e.g., process maturity models, formally<br />

verify protocols, software fault <strong>in</strong>jection, model checkers, buffer overflow tests, dead<br />

code tests). The software can provide for some self protection, similar to what is<br />

currently done for hardware failures (e.g., however, tests alone do not provide assurance,<br />

they only identify the presence or absence of problems for items conta<strong>in</strong>ed with<strong>in</strong> the test<br />

suite).<br />

25. For network environments, exist<strong>in</strong>g DO-178B assurance processes should <strong>in</strong>clude the<br />

follow<strong>in</strong>g three elements for higher-assurance software:<br />

• A series of penetration tests should be performed upon the completed software<br />

item. Specifically, the software (<strong>in</strong>clud<strong>in</strong>g its OS, if any) needs to be subjected to<br />

a range of network attacks described <strong>in</strong> appendix A. Any problems identified<br />

from these attacks need to be fixed.<br />

• Exam<strong>in</strong>e the software under evaluation to verify that its <strong>in</strong>ternal construction<br />

complies with formal models of software construction such as be<strong>in</strong>g modular and<br />

layered <strong>in</strong> terms of a structured presentation with<strong>in</strong> the implementation itself.<br />

• Conduct a rigorous l<strong>in</strong>e-by-l<strong>in</strong>e code <strong>in</strong>spection of the software to demonstrate a<br />

lack of bugs that can be hostilely attacked.<br />

Software items that do not undergo, or cannot pass, these three additional tests cannot be<br />

stated to be high assurance when deployed <strong>in</strong> network environments<br />

26. Very str<strong>in</strong>gent application of exist<strong>in</strong>g software certification processes should be used for<br />

high-assurance software <strong>in</strong> networked environments. The l<strong>in</strong>e-by-l<strong>in</strong>e code <strong>in</strong>spection<br />

requirement for high-assurance software certification should ensure that high-assurance<br />

software code bases explicitly use formal software techniques and are comparatively<br />

small <strong>in</strong> size (<strong>in</strong> terms of the number of l<strong>in</strong>es of code). The <strong>in</strong>spection should actively<br />

seek to identify (and fix) software bugs that can be attacked. The <strong>in</strong>determ<strong>in</strong>ate number<br />

of bugs that are latently present <strong>in</strong> large-code bases represent unaddressed attack<br />

vulnerabilities <strong>in</strong> networked environments. Current software development methods<br />

cannot be trusted to produce high-assurance results unless those results are supplemented<br />

145

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!