Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA
Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA
Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
attempt the theft of passwords. None of the e-mails got through to the <strong>in</strong>tended<br />
targets, MessageLabs said, but the U.K. authorities were alerted.” [31]<br />
Network attacks range <strong>in</strong> severity and purpose, which <strong>in</strong>clude:<br />
• Learn<strong>in</strong>g about the target environment to discern which entity to attack, us<strong>in</strong>g which<br />
attack tools (see appendix A, section A.1). This is known as f<strong>in</strong>gerpr<strong>in</strong>t<strong>in</strong>g and consists<br />
of network reconnaissance, mapp<strong>in</strong>g, and target acquisition activities.<br />
• Attempt<strong>in</strong>g to compromise (i.e., takeover) one or more devices with<strong>in</strong> the target network<br />
(see appendix A, section A.2). Once a device has been successfully cracked (i.e.,<br />
hostilely taken over by an attacker), then the attacker can leverage that device to attack<br />
other entities with<strong>in</strong> the network.<br />
• Attempt<strong>in</strong>g to attack the network distribution system itself (see appendix A, section A.3).<br />
This is often accomplished by availability attacks such as DoS attacks.<br />
• Attempt<strong>in</strong>g to attack the data that traverses the network (see appendix A, section A.4).<br />
This consists of <strong>in</strong>tegrity and confidentiality attacks.<br />
All entities with<strong>in</strong> a network are potentially subject to electronic attack. Entities <strong>in</strong>clude the<br />
devices and software present with<strong>in</strong> the network, the (physical) communications l<strong>in</strong>ks, and the<br />
communications protocols used with<strong>in</strong> the network. Figure 10 shows a network deployment<br />
example. The figure shows that there are three types of devices that can be present with<strong>in</strong> an IP<br />
network:<br />
• Hosts (e.g., computers, which are known <strong>in</strong> OSI term<strong>in</strong>ology as end-systems) are the<br />
source and/or s<strong>in</strong>k of end-user communications.<br />
• Routers (known <strong>in</strong> OSI term<strong>in</strong>ology as the network layer <strong>in</strong>termediate system element)<br />
perform IP forward<strong>in</strong>g of communications between network elements. 6<br />
• Middleboxes are def<strong>in</strong>ed by Request for Comment (RFC) 3234 as “any <strong>in</strong>termediary box<br />
perform<strong>in</strong>g functions apart from [the] normal, standard functions of an IP router on the<br />
data path between the source host and dest<strong>in</strong>ation host.” Figure 10 shows three different<br />
examples of middleboxes:<br />
- Network Address Translator (NAT)—a device that dynamically assigns a<br />
globally unique IP address (without the hosts’ knowledge) to hosts that do not<br />
have one.<br />
- Protocol Translation Gateway—a device that translates communication protocols<br />
between dissimilar protocol systems (e.g., mapp<strong>in</strong>g between IP and OSI (e.g.,<br />
ATN) networks).<br />
6 See the IP Topology Hierarchy section below (section 5.3) for a description of network hierarchy elements.<br />
29