Skip to main content

Protocol analysis and vulnerabilities of Cisco’s autonomic network

Notice

The full text article is not available for purchase.

The publisher only permits individual articles to be downloaded by subscribers.

Autonomic systems are smart independent systems that do not need human intervention to operate. These systems are implemented to manage themselves; they should be self-configured, self-secured against malicious attacks, self-healing in terms of the ability to survive interrupted processes and self-optimised. One form of these systems is the Autonomic Network (AN) developed by IETF and deployed on Cisco systems. The main goal of this work is to analyse the autonomic networking protocol from a malicious attacker’s perspective, then use this analysis to find vulnerabilities within the protocol to gain unauthorised access into the network or hinder its performance. In the course of this work, five different vulnerabilities will be presented, one of which allows systems to crash remotely by knowing their IPv6 address.

Keywords: Autonomic Network; CVE; Cisco; DoS; IPv6

Document Type: Research Article

Publication date: 01 January 2017

More about this publication?
  • Cyber Security is the major new peer-reviewed journal publishing in-depth articles and case studies written by and for cyber security professionals. It will showcase the latest thinking and best practices in cyber security, cyber resilience, cyber crime and cyber warfare, drawing on practical experience in national critical infrastructure, government, corporate, finance, military and not-for-profit sectors.
  • Editorial Board
  • Information for Authors
  • Subscribe to this Title
  • Terms & Conditions
  • Ingenta Connect is not responsible for the content or availability of external websites
  • Access Key
  • Free content
  • Partial Free content
  • New content
  • Open access content
  • Partial Open access content
  • Subscribed content
  • Partial Subscribed content
  • Free trial content
UA-1313315-29