Protocol analysis and vulnerabilities of Cisco’s autonomic network
Autonomic systems are smart independent systems that do not need human intervention to operate. These systems are implemented to manage themselves; they should be self-configured, self-secured against malicious attacks, self-healing in terms of the ability to survive interrupted processes
and self-optimised. One form of these systems is the Autonomic Network (AN) developed by IETF and deployed on Cisco systems. The main goal of this work is to analyse the autonomic networking protocol from a malicious attacker’s perspective, then use this analysis to find vulnerabilities
within the protocol to gain unauthorised access into the network or hinder its performance. In the course of this work, five different vulnerabilities will be presented, one of which allows systems to crash remotely by knowing their IPv6 address.
Keywords: Autonomic Network; CVE; Cisco; DoS; IPv6
Document Type: Research Article
Publication date: 01 January 2017
- Cyber Security is the major new peer-reviewed journal publishing in-depth articles and case studies written by and for cyber security professionals. It will showcase the latest thinking and best practices in cyber security, cyber resilience, cyber crime and cyber warfare, drawing on practical experience in national critical infrastructure, government, corporate, finance, military and not-for-profit sectors.
- Editorial Board
- Information for Authors
- Subscribe to this Title
- Terms & Conditions
- Ingenta Connect is not responsible for the content or availability of external websites
- Access Key
- Free content
- Partial Free content
- New content
- Open access content
- Partial Open access content
- Subscribed content
- Partial Subscribed content
- Free trial content