13.09.2014 Views

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

connection accepted, with the ACK bit used to dist<strong>in</strong>guish between those two possibilities.<br />

However, <strong>in</strong> the context of this report, the TCP SYN attack is a well-known denial of service<br />

(DoS) attack that <strong>in</strong>volves send<strong>in</strong>g the target multiple TCP SYN messages with no <strong>in</strong>tention of<br />

follow<strong>in</strong>g with an ACK. This forces the targets to process the SYN messages, to send out the<br />

SYN/ACK messages, and to ma<strong>in</strong>ta<strong>in</strong> a half-open connection while wait<strong>in</strong>g for an ACK that<br />

never arrives. The goal is to force the target to ma<strong>in</strong>ta<strong>in</strong> so many of these connections that it is<br />

not capable of accept<strong>in</strong>g any further connections requests.<br />

TCP—The state mach<strong>in</strong>e that underlies the Transmission Control Protocol (TCP) uses a number<br />

of bits with<strong>in</strong> the TCP Protocol Header. Various exploits leverage weaknesses <strong>in</strong> the TCP<br />

protocol itself and implementations of the protocol. The primary bits are:<br />

• The Urgent po<strong>in</strong>ter (URG) is used to <strong>in</strong>dicate a byte offset from the current sequence<br />

number at which urgent data are to be found;<br />

• The Acknowledgement number (ACK) is set to 1 <strong>in</strong>dicates that the Acknowledgement<br />

number field <strong>in</strong> the TCP protocol header is valid;<br />

• The PUSHed data (PSH) bit requests the receiver to deliver the data to the application<br />

upon arrival and not to buffer it until a full buffer has been received;<br />

• The reset (RST) bit is used to reset a connection that has become confused due to a host<br />

crash or some other reason;<br />

• The synchronous (SYN) bit is used to establish connections; and<br />

• The f<strong>in</strong>al (FIN) bit is used to release a connection. It specifies that the sender has no<br />

more data to transmit. However, after clos<strong>in</strong>g a connection, a process may cont<strong>in</strong>ue to<br />

receive data <strong>in</strong>def<strong>in</strong>itely. Both SYN and FIN segments have sequence numbers and are<br />

thus guaranteed to be processed <strong>in</strong> the correct order.<br />

TCSEC—The U.S. Department of Defense developed the Trusted Computer System Evaluation<br />

Criteria, which is used to evaluate operat<strong>in</strong>g systems, applications and systems. It is also known<br />

as the “Orange Book” because it was orig<strong>in</strong>ally issued with an orange cover. This criteria<br />

provides a security metric that can be used to compare different systems. It also provides<br />

direction for manufacturers so they can know what specifications to build to.<br />

Threat—The potential for a threat-source to exercise (accidentally trigger or <strong>in</strong>tentionally<br />

exploit) a specific vulnerability (NIST 800-30).<br />

160

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!