Access control for network management
نویسنده
چکیده
ion will also support better automation. Current network technologies leave too much room for human error. Some tasks, such as adding a new airline or shop, may be repeated many times and should become routine; dependencies with local implementation detail must be better hidden to make this simple and dependable. The main driver in day-to-day operations is cost. The air transport industry operates on tight margins; in Heathrow’s case the operator is heavily indebted following a takeover and was forced to divest other London airports by the competition authorities. Investments in new technologies will only happen if there is an unavoidable regulatory mandate, or to save money. 4.3 Hierarchical design Our detailed threat model therefore assumes physical compromise of devices, along with associated attacks that can be done by having physical access. It follows that some devices (the ones ‘in the field’) are unsafe. Once an attacker gains physical access to a 4.3. HIERARCHICAL DESIGN 79 device, he can open, modify, remove, or replace it. It is reasonable to say a number of switches are compromised at a given time, and sometimes controllers at the bottom of the hierarchy are compromised too (since they are deployed near switches). We also assume the communication channels connecting an unsecured switch to be insecure. If an attacker can get access to a device, he also has access to its cabling. Imagine an ISP needing to change a switch at a customer’s site by ordering the equipment from a contractor. There is no guarantee of security at any of the steps from factory and shipping company to contractors and subcontractors and eventually to the customer. Even the customer may modify the equipment if there is incentive to do so. It is not just a matter of occasional access by secret policemen at points of presence in less well-governed countries; recent Edward Snowden files reveal that NSA tampered with Cisco supply chain of hardware exported to other countries. In a time of conflict, the opportunity would exist for an opponent who had taken over one of the routers to use it to cause havoc, by inserting false rules, or removing and replacing legitimate ones, and thus generally disrupting the switching fabric. If a network has a thousand routers and any one of them can disrupt it, as is the case today, then an attacker need compromise a few routers for the whole network to become vulnerable.
منابع مشابه
Access and Mobility Policy Control at the Network Edge
The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...
متن کاملNetwork Analysis of Interpersonal Relationships in Tehran Stock Exchange
The stock market has an important role in growth and development of countries. Network analysis is one of the latest method in analyzing the stock market. In quantitative science literature, It is a new concept for a macro view to whole market. Therefore, this research analyzes the interpersonal relationships’ network in the Tehran Stock Exchange (TSE). From the type of data collected and analy...
متن کاملA Hidden Node Aware Network Allocation Vector Management System for Multi-hop Wireless Ad hoc Networks
Many performance evaluations for IEEE 802.11distributed coordination function (DCF) have been previouslyreported in the literature. Some of them have clearly indicatedthat 802.11 MAC protocol has poor performance in multi-hopwireless ad hoc networks due to exposed and hidden nodeproblems. Although RTS/CTS transmission scheme mitigatesthese phenomena, it has not been successful in thoroughlyomit...
متن کاملDistributed Control and Management Framework for Mobile and Multi-access Communication
To support roaming, access control, and different optimizations in the network architecture, a new distributed control and management framework, shown in Figure 1, is required. The basis of this framework is a unified signalling architecture that is capable of serving different entities, located either in the network or in the terminals controlled by different players (terminals by the user, ne...
متن کاملMeasuring Access to Urban Health Services Using Geographical Information System (GIS): A Case Study of Health Service Management in Bandar Abbas, Iran
Background The current distribution of and access to health services along with the future health needs of the population have prompted wide application of Geographic Information Systems (GISs). During recent years, GIS has been used in public health management for planning and organization of healthcare services. This study investigates geographical accessibility of residential areas in Bandar...
متن کاملThe Role of Regulatory in Price Control and Spectrum Allocation to Competing Wireless Access Networks
With the rapid growth of wireless access networks, various providers offer their services using different technologies such as Wi-Fi, Wimax, 3G, 4G and so on. These networks compete for the scarce wireless spectrum. The spectrum is considered to be a scarce resource moderated by the spectrum allocation regulatory (“regulatory” for short) which is the governance body aiming to maximize the socia...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017