6 research outputs found
Recommended from our members
Final report for the Multiprotocol Label Switching (MPLS) control plane security LDRD project.
As rapid Internet growth continues, global communications becomes more dependent on Internet availability for information transfer. Recently, the Internet Engineering Task Force (IETF) introduced a new protocol, Multiple Protocol Label Switching (MPLS), to provide high-performance data flows within the Internet. MPLS emulates two major aspects of the Asynchronous Transfer Mode (ATM) technology. First, each initial IP packet is 'routed' to its destination based on previously known delay and congestion avoidance mechanisms. This allows for effective distribution of network resources and reduces the probability of congestion. Second, after route selection each subsequent packet is assigned a label at each hop, which determines the output port for the packet to reach its final destination. These labels guide the forwarding of each packet at routing nodes more efficiently and with more control than traditional IP forwarding (based on complete address information in each packet) for high-performance data flows. Label assignment is critical in the prompt and accurate delivery of user data. However, the protocols for label distribution were not adequately secured. Thus, if an adversary compromises a node by intercepting and modifying, or more simply injecting false labels into the packet-forwarding engine, the propagation of improperly labeled data flows could create instability in the entire network. In addition, some Virtual Private Network (VPN) solutions take advantage of this 'virtual channel' configuration to eliminate the need for user data encryption to provide privacy. VPN's relying on MPLS require accurate label assignment to maintain user data protection. This research developed a working distributive trust model that demonstrated how to deploy confidentiality, authentication, and non-repudiation in the global network label switching control plane. Simulation models and laboratory testbed implementations that demonstrated this concept were developed, and results from this research were transferred to industry via standards in the Optical Internetworking Forum (OIF)
Recommended from our members
A classification of the rational integrable generalized standard maps
This dissertation examines the integrability of certain planar maps. An integral of a planar map is a real-valued function that remains invariant under composition with the map. In particular we classify the generalized standard maps, maps of the form φ(x, y) = (f(x)-y, x), that have a polynomial integral and those that have a rational integral. Chapter 1 brings to light the pertinent definitions. Here we show numerical examples of integrability, non-integrability and questionable integrability. Chapter 1 concludes with a discourse on linear maps, giving a classification of those with a polynomial or rational integral. The meat of this work lies in Chapter 2, which contains the classification of the generalized standard maps. Here we give a short list of the maps that have a polynomial integral as well as an integral for each case. Finally we show that if a generalized standard map has a rational integral then it has a polynomial integral. Deciding if a planar map is integrable or deciding what family the integral lies in is one of the difficult tasks assumed by the field of dynamical systems. Here we have approached the integrability question from an algebraic viewpoint. Some attempt has been made to make the proofs simple yet complete, without using the heavy-duty analytical tools that can often be found in the analysis of a dynamical systems
Recommended from our members
Parallelism of the SANDstorm hash algorithm.
Mainstream cryptographic hashing algorithms are not parallelizable. This limits their speed and they are not able to take advantage of the current trend of being run on multi-core platforms. Being limited in speed limits their usefulness as an authentication mechanism in secure communications. Sandia researchers have created a new cryptographic hashing algorithm, SANDstorm, which was specifically designed to take advantage of multi-core processing and be parallelizable on a wide range of platforms. This report describes a late-start LDRD effort to verify the parallelizability claims of the SANDstorm designers. We have shown, with operating code and bench testing, that the SANDstorm algorithm may be trivially parallelized on a wide range of hardware platforms. Implementations using OpenMP demonstrates a linear speedup with multiple cores. We have also shown significant performance gains with optimized C code and the use of assembly instructions to exploit particular platform capabilities
Recommended from our members
The theory of diversity and redundancy in information system security : LDRD final report.
The goal of this research was to explore first principles associated with mixing of diverse implementations in a redundant fashion to increase the security and/or reliability of information systems. Inspired by basic results in computer science on the undecidable behavior of programs and by previous work on fault tolerance in hardware and software, we have investigated the problem and solution space for addressing potentially unknown and unknowable vulnerabilities via ensembles of implementations. We have obtained theoretical results on the degree of security and reliability benefits from particular diverse system designs, and mapped promising approaches for generating and measuring diversity. We have also empirically studied some vulnerabilities in common implementations of the Linux operating system and demonstrated the potential for diversity to mitigate these vulnerabilities. Our results provide foundational insights for further research on diversity and redundancy approaches for information systems