Apologies for the belated reply. The paper Albert was referring to can be found at [1].

Florin

[1] <http://arxiv.org/abs/1312.1378>http://arxiv.org/pdf/1312.1378v2.pdf

On 12/04/2013 09:28 PM, Albert Cabellos wrote:
Hi

I went through the document in detail and IMHO it is well structured and
more importantly, it provides a complete and meticulous analysis of the
security threats of LISP on a public deployment.
Below you can find some comments:

Regards

Albert


* Section 4.2->In addition to the attacks described in this section
end-hosts behind an ITR could use the data-plane to overflow the ITR's
Map-Cache by sending packets to non-popular EID prefixes (pretty much as
a scan attack but with a different goal). In this scenario the xTR may
evict entries from the map-cache that are popular (and in-use) and disrupt the normal operation of the network by forcing flows to miss. Florin will send a paper describing and analyzing
in detail the attack and its impact on cache performance.

_______________________________________________
lisp mailing list
lisp@ietf.org
https://www.ietf.org/mailman/listinfo/lisp

Reply via email to