Skip to main content

MPLS Unleashed: Remedy Using IPSEC over MPLS VPN

  • Conference paper
Information Security and Assurance (ISA 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 76))

Included in the following conference series:

  • 1119 Accesses

Abstract

As a result of globalization, companies are striving to reach out to their customers, suppliers and partners thus extending their enterprise to provide access to critical information and offer their services upon whom their business is dependent. The bedrock of far reaching enterprise is IP network. Researchers have developed core network technology like MPLS with promising features of flexibility, scalability and security to enable enterprises to extend their businesses and transact successfully. As a result, MPLS is widely used in supporting applications like data, voice and video on the internet. It has been highly competitive from its predecessors Frame relay and ATM in terms of providing supports services. Notwithstanding its attributes, there are vulnerabilities and risks associated with MPLS. Recent papers and research reports have highlighted such issues. This paper represents a further contribution in identifying MPLS vulnerabilities and risks. In addition to discussing conventional approach of mitigating those risks, the paper also proposes IPSEC over MPLS VPN and its benefit over conventional approach.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Meta switch Network, http://www.metaswitch.com/MPLS/what-is-MPLS.aspx

  2. Cramsession articles what you need when you need, http://www.cramsession.com/articles/get-article.asp?aid=329

  3. Fischer, T.: MPLS security Overview. IRM PLC (December 2007)

    Google Scholar 

  4. Raza: Online routing of bandwidth guaranteed paths with local restoration using optimized aggregate usage information. In: IEEE-ICC (2005)

    Google Scholar 

  5. Li, L.: Routing bandwidth guaranteed paths with local restoration in label switched networks. IEEE journal on selected areas in communications (2006)

    Google Scholar 

  6. Harrell, R.: Carrier MPLS support for VOIP

    Google Scholar 

  7. Palmieri, F.: VPN scalability over high performance backbones evaluating MPLS VPN against traditional approaches. In: Proceeding of the Eighth IEEE international symposium on computers and communication (2003)

    Google Scholar 

  8. Behringer, M.H., Morrow, M.J.: How IPSEC complements MPLS. Cisco press, Networkworld (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shirazi, S.NuH., Asim, M., Irfan, M., Ikram, N. (2010). MPLS Unleashed: Remedy Using IPSEC over MPLS VPN. In: Bandyopadhyay, S.K., Adi, W., Kim, Th., Xiao, Y. (eds) Information Security and Assurance. ISA 2010. Communications in Computer and Information Science, vol 76. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13365-7_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13365-7_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13364-0

  • Online ISBN: 978-3-642-13365-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics