13.09.2014 Views

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

A.3.1 DENIAL OF SERVICE ATTACKS.<br />

There are a myriad of possible ways that DoS attacks may occur with<strong>in</strong> networks. So many, <strong>in</strong><br />

fact, that a complete enumeration of the possible mechanisms is probably not possible.<br />

However, RFCs 3704 and 3882 provide guidance to protect aga<strong>in</strong>st certa<strong>in</strong> classes of DoS<br />

attacks. The follow<strong>in</strong>g are some of the more commonly known DoS exploits.<br />

• Insertion of bogus rout<strong>in</strong>g data <strong>in</strong>to the rout<strong>in</strong>g table caus<strong>in</strong>g rout<strong>in</strong>g loops, needlessly<br />

delay<strong>in</strong>g, or needlessly dropp<strong>in</strong>g packets<br />

• Computers send<strong>in</strong>g vast amount of traffic to a device’s port address<br />

• Nmap-based scan attacks aga<strong>in</strong>st devices us<strong>in</strong>g some other computer’s source IP<br />

Addresses<br />

• Hosts send<strong>in</strong>g vast amounts of traffic to other hosts with<strong>in</strong> networks<br />

A.3.2 DISRUPTING ROUTING.<br />

The Internet Eng<strong>in</strong>eer<strong>in</strong>g Task Force (IETF) has recently begun to enumerate the specific threats<br />

associated with standard IETF protocols. These threats can directly or <strong>in</strong>directly disrupt rout<strong>in</strong>g<br />

systems 15 . They have produced three documents that address threats to rout<strong>in</strong>g protocols [A-15,<br />

A-16, and A-17].<br />

Reference A-18 discusses the generic threats to rout<strong>in</strong>g protocols. Rout<strong>in</strong>g protocols are<br />

vulnerable to potential attacks aga<strong>in</strong>st any one of the three functions that they share <strong>in</strong> common:<br />

• “Transport Subsystem: The rout<strong>in</strong>g protocol transmits messages to its<br />

neighbors us<strong>in</strong>g some underly<strong>in</strong>g protocol. For example, OSPF uses IP,<br />

while other protocols may run over TCP.<br />

• “Neighbor State Ma<strong>in</strong>tenance: neighbor<strong>in</strong>g relationship formation is the<br />

first step for topology determ<strong>in</strong>ation. For this reason, rout<strong>in</strong>g protocols may<br />

need to ma<strong>in</strong>ta<strong>in</strong> the state of their neighbors. Each rout<strong>in</strong>g protocol may use<br />

a different mechanism for determ<strong>in</strong><strong>in</strong>g its neighbors <strong>in</strong> the rout<strong>in</strong>g topology.<br />

Some protocols have dist<strong>in</strong>ct exchange sequences used to establish<br />

neighbor<strong>in</strong>g relationships, e.g., Hello exchanges <strong>in</strong> OSPF.<br />

• “Database Ma<strong>in</strong>tenance: Rout<strong>in</strong>g protocols exchange network topology and<br />

reachability <strong>in</strong>formation. The routers collect this <strong>in</strong>formation <strong>in</strong> rout<strong>in</strong>g<br />

databases with vary<strong>in</strong>g detail. The ma<strong>in</strong>tenance of these databases is a<br />

significant portion of the function of a rout<strong>in</strong>g protocol.” (Quoted from<br />

Section 2 of reference A-15.)<br />

15 see http://www.ietf.org/html.charters/rpsec-charter.html<br />

A-14

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!