Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA
Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA
Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
A.3.1 DENIAL OF SERVICE ATTACKS.<br />
There are a myriad of possible ways that DoS attacks may occur with<strong>in</strong> networks. So many, <strong>in</strong><br />
fact, that a complete enumeration of the possible mechanisms is probably not possible.<br />
However, RFCs 3704 and 3882 provide guidance to protect aga<strong>in</strong>st certa<strong>in</strong> classes of DoS<br />
attacks. The follow<strong>in</strong>g are some of the more commonly known DoS exploits.<br />
• Insertion of bogus rout<strong>in</strong>g data <strong>in</strong>to the rout<strong>in</strong>g table caus<strong>in</strong>g rout<strong>in</strong>g loops, needlessly<br />
delay<strong>in</strong>g, or needlessly dropp<strong>in</strong>g packets<br />
• Computers send<strong>in</strong>g vast amount of traffic to a device’s port address<br />
• Nmap-based scan attacks aga<strong>in</strong>st devices us<strong>in</strong>g some other computer’s source IP<br />
Addresses<br />
• Hosts send<strong>in</strong>g vast amounts of traffic to other hosts with<strong>in</strong> networks<br />
A.3.2 DISRUPTING ROUTING.<br />
The Internet Eng<strong>in</strong>eer<strong>in</strong>g Task Force (IETF) has recently begun to enumerate the specific threats<br />
associated with standard IETF protocols. These threats can directly or <strong>in</strong>directly disrupt rout<strong>in</strong>g<br />
systems 15 . They have produced three documents that address threats to rout<strong>in</strong>g protocols [A-15,<br />
A-16, and A-17].<br />
Reference A-18 discusses the generic threats to rout<strong>in</strong>g protocols. Rout<strong>in</strong>g protocols are<br />
vulnerable to potential attacks aga<strong>in</strong>st any one of the three functions that they share <strong>in</strong> common:<br />
• “Transport Subsystem: The rout<strong>in</strong>g protocol transmits messages to its<br />
neighbors us<strong>in</strong>g some underly<strong>in</strong>g protocol. For example, OSPF uses IP,<br />
while other protocols may run over TCP.<br />
• “Neighbor State Ma<strong>in</strong>tenance: neighbor<strong>in</strong>g relationship formation is the<br />
first step for topology determ<strong>in</strong>ation. For this reason, rout<strong>in</strong>g protocols may<br />
need to ma<strong>in</strong>ta<strong>in</strong> the state of their neighbors. Each rout<strong>in</strong>g protocol may use<br />
a different mechanism for determ<strong>in</strong><strong>in</strong>g its neighbors <strong>in</strong> the rout<strong>in</strong>g topology.<br />
Some protocols have dist<strong>in</strong>ct exchange sequences used to establish<br />
neighbor<strong>in</strong>g relationships, e.g., Hello exchanges <strong>in</strong> OSPF.<br />
• “Database Ma<strong>in</strong>tenance: Rout<strong>in</strong>g protocols exchange network topology and<br />
reachability <strong>in</strong>formation. The routers collect this <strong>in</strong>formation <strong>in</strong> rout<strong>in</strong>g<br />
databases with vary<strong>in</strong>g detail. The ma<strong>in</strong>tenance of these databases is a<br />
significant portion of the function of a rout<strong>in</strong>g protocol.” (Quoted from<br />
Section 2 of reference A-15.)<br />
15 see http://www.ietf.org/html.charters/rpsec-charter.html<br />
A-14