Home > Research > Publications & Outputs > MPLS unleashed

Text available via DOI:

View graph of relations

MPLS unleashed: remedy using IPSEC over MPLS VPN

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

MPLS unleashed: remedy using IPSEC over MPLS VPN. / Shirazi, Syed Noorulhassan ; Asim, Muhammad; Irfan, Muhammad et al.
Information Security and Assurance: 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010. ed. / Samir Kumar Bandyopadhyay; Wael Adi; Tai-hoon Kim; Yang Xiao. Berlin: Springer-Verlag, 2010. p. 241-248 (Communications in Computer and Information Science; Vol. 76).

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Shirazi, SN, Asim, M, Irfan, M & Ikram, N 2010, MPLS unleashed: remedy using IPSEC over MPLS VPN. in SK Bandyopadhyay, W Adi, T Kim & Y Xiao (eds), Information Security and Assurance: 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010. Communications in Computer and Information Science, vol. 76, Springer-Verlag, Berlin, pp. 241-248. https://doi.org/10.1007/978-3-642-13365-7_24

APA

Shirazi, S. N., Asim, M., Irfan, M., & Ikram, N. (2010). MPLS unleashed: remedy using IPSEC over MPLS VPN. In S. K. Bandyopadhyay, W. Adi, T. Kim, & Y. Xiao (Eds.), Information Security and Assurance: 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010 (pp. 241-248). (Communications in Computer and Information Science; Vol. 76). Springer-Verlag. https://doi.org/10.1007/978-3-642-13365-7_24

Vancouver

Shirazi SN, Asim M, Irfan M, Ikram N. MPLS unleashed: remedy using IPSEC over MPLS VPN. In Bandyopadhyay SK, Adi W, Kim T, Xiao Y, editors, Information Security and Assurance: 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010. Berlin: Springer-Verlag. 2010. p. 241-248. (Communications in Computer and Information Science). doi: 10.1007/978-3-642-13365-7_24

Author

Shirazi, Syed Noorulhassan ; Asim, Muhammad ; Irfan, Muhammad et al. / MPLS unleashed : remedy using IPSEC over MPLS VPN. Information Security and Assurance: 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010. editor / Samir Kumar Bandyopadhyay ; Wael Adi ; Tai-hoon Kim ; Yang Xiao. Berlin : Springer-Verlag, 2010. pp. 241-248 (Communications in Computer and Information Science).

Bibtex

@inproceedings{938dbbf37eeb4f9f9fec8df69c0a71bb,
title = "MPLS unleashed: remedy using IPSEC over MPLS VPN",
abstract = " As a result of globalization, companies are striving to reach out to their customers, suppliers and partners thus extending their enterprise to provide access to critical information and offer their services upon whom their business is dependent. The bedrock of far reaching enterprise is IP network. Researchers have developed core network technology like MPLS with promising features of flexibility, scalability and security to enable enterprises to extend their businesses and transact successfully. As a result, MPLS is widely used in supporting applications like data, voice and video on the internet. It has been highly competitive from its predecessors Frame relay and ATM in terms of providing supports services. Notwithstanding its attributes, there are vulnerabilities and risks associated with MPLS. Recent papers and research reports have highlighted such issues. This paper represents a further contribution in identifying MPLS vulnerabilities and risks. In addition to discussing conventional approach of mitigating those risks, the paper also proposes IPSEC over MPLS VPN and its benefit over conventional approach. ",
author = "Shirazi, {Syed Noorulhassan} and Muhammad Asim and Muhammad Irfan and Nassar Ikram",
year = "2010",
doi = "10.1007/978-3-642-13365-7_24",
language = "English",
isbn = "9783642133640",
series = "Communications in Computer and Information Science",
publisher = "Springer-Verlag",
pages = "241--248",
editor = "Bandyopadhyay, {Samir Kumar} and Wael Adi and Tai-hoon Kim and Yang Xiao",
booktitle = "Information Security and Assurance",

}

RIS

TY - GEN

T1 - MPLS unleashed

T2 - remedy using IPSEC over MPLS VPN

AU - Shirazi, Syed Noorulhassan

AU - Asim, Muhammad

AU - Irfan, Muhammad

AU - Ikram, Nassar

PY - 2010

Y1 - 2010

N2 - As a result of globalization, companies are striving to reach out to their customers, suppliers and partners thus extending their enterprise to provide access to critical information and offer their services upon whom their business is dependent. The bedrock of far reaching enterprise is IP network. Researchers have developed core network technology like MPLS with promising features of flexibility, scalability and security to enable enterprises to extend their businesses and transact successfully. As a result, MPLS is widely used in supporting applications like data, voice and video on the internet. It has been highly competitive from its predecessors Frame relay and ATM in terms of providing supports services. Notwithstanding its attributes, there are vulnerabilities and risks associated with MPLS. Recent papers and research reports have highlighted such issues. This paper represents a further contribution in identifying MPLS vulnerabilities and risks. In addition to discussing conventional approach of mitigating those risks, the paper also proposes IPSEC over MPLS VPN and its benefit over conventional approach.

AB - As a result of globalization, companies are striving to reach out to their customers, suppliers and partners thus extending their enterprise to provide access to critical information and offer their services upon whom their business is dependent. The bedrock of far reaching enterprise is IP network. Researchers have developed core network technology like MPLS with promising features of flexibility, scalability and security to enable enterprises to extend their businesses and transact successfully. As a result, MPLS is widely used in supporting applications like data, voice and video on the internet. It has been highly competitive from its predecessors Frame relay and ATM in terms of providing supports services. Notwithstanding its attributes, there are vulnerabilities and risks associated with MPLS. Recent papers and research reports have highlighted such issues. This paper represents a further contribution in identifying MPLS vulnerabilities and risks. In addition to discussing conventional approach of mitigating those risks, the paper also proposes IPSEC over MPLS VPN and its benefit over conventional approach.

U2 - 10.1007/978-3-642-13365-7_24

DO - 10.1007/978-3-642-13365-7_24

M3 - Conference contribution/Paper

SN - 9783642133640

T3 - Communications in Computer and Information Science

SP - 241

EP - 248

BT - Information Security and Assurance

A2 - Bandyopadhyay, Samir Kumar

A2 - Adi, Wael

A2 - Kim, Tai-hoon

A2 - Xiao, Yang

PB - Springer-Verlag

CY - Berlin

ER -