against STP presented in Section 2.1. All detection
actions are made by the detectors in the NEs, but we
simplify the presentation by forgetting this separation
between a NE and its detector.
• ID changing attacks. Recall that each NE stores
a representation of the state machine of its neigh-
bors. This representation includes the Bridge ID
of the neighbors. If the NE receives two or more
BPDUs with different sender IDs from the same
port, it detects that its neighbor is malicious (if
the ID is modified by an administrator, other NEs
should be informed).
• Silent attacks. For this type of attacks, when a ma-
licious NE stays silent on purpose, other NEs will
generate a timeout event, consider it as a legitim
NE failure and send Topology Change Notifica-
tion BPDUs (see Figure 2). So, the specification-
based intrusion detection scheme does not detect
it to be an attack. One solution would be the elim-
ination of the timeout event from the specifica-
tion, so a timeout would always be suspected of
being an attack, but it would generate suspicions
for every (non-malicious) failure. The solution is
not to detect if the NE simulates a failure but if it
does it too many times. This detection is done
using the pattern of the event timeout between
the states Wait for CONF BPDU and Wait for -
TCNA BPDU, i.e., if that timeout expires more
than Rmax
timeout
times in a unit of time then the
NE is malicious.
• Faked failure attacks. This attack is done by send-
ing a Topology Change Notification BPDU re-
peatedly, so it is detected if that BPDU is not sent
in the state Wait for TCNA BPDU or if it is sent
more than Rmax
tcn
times in a unit of time.
• BPDU flooding attacks. These attacks are de-
tected when events that send the BPDUs are done
more than the corresponding Rmax
e
times in a
unit of time.
• Invalid BPDU. This attack is directly detected
by the specification-based intrusion detection
scheme, since an invalid BPDU is precisely one
that can not be sent in the current state of the NE.
When a NE is identified as being malicious, it will
be logically removed from the network, i.e., its neigh-
bor NEs will disconnect all ports connected to it. Nat-
urally this is only possible if the network has enough
redundancy to disconnect an NE and still keep the net-
work connected. Moreover, it requires that the NEs
correlate their detections (Kruegel et al., 2005), in
order to make agreement about which NE(s) is ma-
licious. This correlation and disconnection scheme is
still being investigated.
3 CONCLUSION
The Internet and the World-Wide Web have become
more and more important in modern society. How-
ever, they also became the target of a legion of ma-
licious hackers. Compromising a low layer, like the
Data Link Layer, can affect the reliability of higher
layers, like TCP/IP, HTTP, SOAP and other web pro-
tocols. This work gives a novel perspective about a se-
curity solution for low-level network protocols, based
on a specification-based intrusion detection system
enhanced with annotations. More precisely, we pre-
sented a solution for protecting Carrier Ethernet by
detecting attacks against the STP protocol. We argued
that protecting these protocols is crucial to ensure the
availability of the network so higher level protocols,
like HTTP and other Web-related protocols can be ex-
ecuted normally.
ACKNOWLEDGEMENTS
The work presented in the paper is funded by Siemens
Networks, S.A. Portugal.
REFERENCES
Balepin, I., Maltsev, S., Rowe, J., and Levitt, K. N. (2003).
Using specification-based intrusion detection for au-
tomated response. In Proceedings of the International
Symposium on Recent Advances in Intrusion Detec-
tion, pages 136–154.
Cisco (2005a). Spanning Tree PortFast BPDU Guard En-
hancement. Cisco Systems Inc. Document ID 10586.
Cisco (2005b). Spanning Tree Protocol Root Guard En-
hancement. Cisco Systems Inc. Document ID 10588.
IEEE (1998). ANSI/IEEE 802.1D-2004 standard - Part 3:
Media Access Control (MAC) Bridges.
Kruegel, C., Valeur, F., and Vigna, G. (2005). Intru-
sion Detection and Correlation: Challenges and Solu-
tions, volume 14 of Advances in Information Security.
Springer-Verlag.
Marro, G. M. (2003). Attacks at the data link layer. Master’s
thesis, University of California.
Sekar, R., Gupta, A., Frullo, J., Shanbhag, T., Tiwari, A.,
Yang, H., and Zhou, S. (2002). Specification-based
anomaly detection: a new approach for detecting net-
work intrusions. In Proceedings of the 9th ACM con-
ference on Computer and communications security,
pages 265–274.
Uppuluri, P. and Sekar, R. (2001). Experiences with
specification-based intrusion detection. Lecture Notes
in Computer Science, 2212:172–189.
SPECIFICATION-BASED INTRUSION DETECTION SYSTEM FOR CARRIER ETHERNET
429