13.09.2014 Views

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

attempt the theft of passwords. None of the e-mails got through to the <strong>in</strong>tended<br />

targets, MessageLabs said, but the U.K. authorities were alerted.” [31]<br />

Network attacks range <strong>in</strong> severity and purpose, which <strong>in</strong>clude:<br />

• Learn<strong>in</strong>g about the target environment to discern which entity to attack, us<strong>in</strong>g which<br />

attack tools (see appendix A, section A.1). This is known as f<strong>in</strong>gerpr<strong>in</strong>t<strong>in</strong>g and consists<br />

of network reconnaissance, mapp<strong>in</strong>g, and target acquisition activities.<br />

• Attempt<strong>in</strong>g to compromise (i.e., takeover) one or more devices with<strong>in</strong> the target network<br />

(see appendix A, section A.2). Once a device has been successfully cracked (i.e.,<br />

hostilely taken over by an attacker), then the attacker can leverage that device to attack<br />

other entities with<strong>in</strong> the network.<br />

• Attempt<strong>in</strong>g to attack the network distribution system itself (see appendix A, section A.3).<br />

This is often accomplished by availability attacks such as DoS attacks.<br />

• Attempt<strong>in</strong>g to attack the data that traverses the network (see appendix A, section A.4).<br />

This consists of <strong>in</strong>tegrity and confidentiality attacks.<br />

All entities with<strong>in</strong> a network are potentially subject to electronic attack. Entities <strong>in</strong>clude the<br />

devices and software present with<strong>in</strong> the network, the (physical) communications l<strong>in</strong>ks, and the<br />

communications protocols used with<strong>in</strong> the network. Figure 10 shows a network deployment<br />

example. The figure shows that there are three types of devices that can be present with<strong>in</strong> an IP<br />

network:<br />

• Hosts (e.g., computers, which are known <strong>in</strong> OSI term<strong>in</strong>ology as end-systems) are the<br />

source and/or s<strong>in</strong>k of end-user communications.<br />

• Routers (known <strong>in</strong> OSI term<strong>in</strong>ology as the network layer <strong>in</strong>termediate system element)<br />

perform IP forward<strong>in</strong>g of communications between network elements. 6<br />

• Middleboxes are def<strong>in</strong>ed by Request for Comment (RFC) 3234 as “any <strong>in</strong>termediary box<br />

perform<strong>in</strong>g functions apart from [the] normal, standard functions of an IP router on the<br />

data path between the source host and dest<strong>in</strong>ation host.” Figure 10 shows three different<br />

examples of middleboxes:<br />

- Network Address Translator (NAT)—a device that dynamically assigns a<br />

globally unique IP address (without the hosts’ knowledge) to hosts that do not<br />

have one.<br />

- Protocol Translation Gateway—a device that translates communication protocols<br />

between dissimilar protocol systems (e.g., mapp<strong>in</strong>g between IP and OSI (e.g.,<br />

ATN) networks).<br />

6 See the IP Topology Hierarchy section below (section 5.3) for a description of network hierarchy elements.<br />

29

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!