Since its inception more than a decade ago, multiprotocol label switching MPLS has become one of the fastest-growing telecommunications infrastructure technologies. The speed, flexibility, sophisticated traffic management and cost savings offered by MPLS have prompted service providers to converge existing and new technologies onto common MPLS backbones. The rapid adoption of MPLS raises significant concerns — primarily because of the dependence of critical communication services on a technology that has yet to undergo significant security testing. Our analysis has identified ten attacks that exploit weaknesses in the LDP specification: six attacks that disrupt service and four that divert traffic from intended routes. Details of the attacks are presented along with suggested mitigation strategies and security postures.
|Published (Last):||10 December 2018|
|PDF File Size:||18.87 Mb|
|ePub File Size:||8.7 Mb|
|Price:||Free* [*Free Regsitration Required]|
Committed to connecting the world. ITU-T work programme. ITU-T A. Justification for the specific reference: Draft Rec. Relationship with other existing or emerging documents: References within the referenced RFC are listed under item 8. Feldman, B. Jamoussi, S. Andersson, A. Fredette, B. Jamoussi, R. Callon, P. Feldman, E. Gray, J. Halpern, J. Heinanen T. Kilty, A. Malis, M. Girish, K. Sundell, P. Worster, L.
Wu, R. Comments on RFCs and corresponding changes are accommodated through the existing standardization process. All RFCs always remain available on-line. Other for any supplementary information : All RFCs are available on-line. Feedback Contact Us Accessibility. Clear description of the referenced document:.
Justification for the specific reference:. Draft Rec. Current information, if any, about IPR issues:. Other useful information describing the "Quality" of the document:. The degree of stability or maturity of the document:. Relationship with other existing or emerging documents:. References within the referenced RFC are listed under item 8.
Any explicit references within that referenced document should also be listed:. Other for any supplementary information :. All RFCs are available on-line.
About This Network Configuration Example
Cisco Nexus 7000 Series NX-OS MPLS Configuration Guide
ITU-T work programme
Security Analysis of the MPLS Label Distribution Protocol