Abstract

Multiprotocol label switching (MPLS) is one of the fastest growing telecommunications infrastructure technologies. MPLS provides OSI layer 2 switching speed coupled with layer 3 addressing, and supports multiple service models and sophisticated traffic management. Several telecommunications companies have made massive investments in MPLS technology. Indeed, within a few years, a major portion of global data, voice and video traffic is expected to travel over MPLS network cores. This paper examines the security issues related to the RSVP-TE signaling protocol, which is vital to creating and managing the high-speed paths used by MPLS traffic. Our analysis has revealed several exploits–ranging from network enumeration to denial-of-service attacks–that can significantly impact MPLS networks. The exploits are discussed in detail along with proposed mitigation strategies.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.