Apologies for the belated reply. The paper Albert was referring to can
be found at [1].
Florin
[1] <http://arxiv.org/abs/1312.1378>http://arxiv.org/pdf/1312.1378v2.pdf
On 12/04/2013 09:28 PM, Albert Cabellos wrote:
Hi
I went through the document in detail and IMHO it is well structured and
more importantly, it provides a complete and meticulous analysis of the
security threats of LISP on a public deployment.
Below you can find some comments:
Regards
Albert
* Section 4.2->In addition to the attacks described in this section
end-hosts behind an ITR could use the data-plane to overflow the ITR's
Map-Cache by sending packets to non-popular EID prefixes (pretty much as
a scan attack but with a different goal). In this scenario the xTR may
evict entries from the map-cache that are popular (and in-use) and
disrupt the normal
operation of the network by forcing flows to miss. Florin will send a
paper describing and analyzing
in detail the attack and its impact on cache performance.
_______________________________________________
lisp mailing list
lisp@ietf.org
https://www.ietf.org/mailman/listinfo/lisp