Abstract
As currently adopted by the ATM Forum LANE SWG, LAN Emulation specifications include many security weaknesses making communications on Emulated LANs (ELANs) vulnerable to heavy threats (in the sense of X800) such as masquerade, information disclosure and denial of service.
This paper aims at highlighting ELAN’s security problems. To this end, a number of attacks scenarios are studied over the ELAN architecture and details relating to the way an attacker may perform each attack — how, from where, with which collusion (if any), which facilities, which level of difficulty — are given.
Chapter PDF
References
ATM Forum (1994) ATM User-Network Interface Specification, version 3. 1.
Biagioni, E., Cooper, E. and Sansom, R. (1993) Designing a practical ATM LAN. IEEE Network, mars 1993, 32–39.
De Prycker, M. (1991) Asynchronous Transfer Mode: Solution for broadband ISDN Ellis Horwood, New York.
Ellington (1995) LAN Emulation Over ATM, version 1.0, ATMFORUM/94–0021.
IEEE 802.10 (1989) Standard for Interoperable Local Area Network (LAN Security ( SILS) — Part A — The Model, December 1989.
IEEE 802.10 (1990) Standard for Interoperable Local Area Network (LAN Security ( SILS) - Part B- Secure Data Exchange, January 1990.
ITSEM (Information Technology Security Evaluation Manual) — Version 1.0 — September 1993. ITSEC (Information Technology Security Evaluation Criteria) — Version 1.2, Luxembourg, June 1991.
JCSEC (Japanese Computer Security Evaluation Criteria) (1992) Functionality Requirement, Japan Electronic Industry Development Association, Draft Version 1.0, August 1992.
Jeffries, R. (1994) ATM LAN Emulation: the inside story. Data communications, September 1994.
Kaufman, C. Perlman, R. and Speciner, M. (1995) Network Security, Private communication in a public world, Prentice Hall, Englewood Cliffs NJ 07632.
Newman, P. (1994) ATM Local Area Networks, IEEE Communications Magazine, March 1994.
Pierson, L. G. and Tarman, T.D. (1995) ATM Forum / 95-0137 — Requirements for Security Signaling.
Stiller, B. (1995) A survey of UNI signaling systems and protocols for ATM networks, ACM SIGCOM, Vol 25 no 2, 21–33.
Truong, H.L. Ellington, W.W. Jr., Le Boudec, J.Y. Meier, A.X. and Pace, J.W. (1995) LAN Emulation on an ATM network, IEEE Communications Magazine, May 1995.
UIT-T X.800 (1991) Data communication networks; open systems interconnection (OSI); security, structure and applications. Security architecture for open systems interconnection for CCITT applications.
Vetter, R.J. (1995) ATM concepts, architectures, and protocols, Communications of the ACM, Vol. 38, n° 2, 30–38 109.
Voydock, V.L. and Kent, S.T. (1983) Security mechanisms in high-level network protocols, ACM Computing Surveys, Vol 15 n0 2, 135–171.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1996 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Laurent, M. (1996). Security Flows Analysis of the ATM Emulated LAN Architecture. In: Horster, P. (eds) Communications and Multimedia Security II. IFIP Advances in Information and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35083-7_4
Download citation
DOI: https://doi.org/10.1007/978-0-387-35083-7_4
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-5041-2931-2
Online ISBN: 978-0-387-35083-7
eBook Packages: Springer Book Archive