TY - BOOK
T1 - Cyber Resilience in the Cast Timing System
AU - Styles, Ryan
AU - Asiamah, Joel
AU - Borges Hink, Raymond
AU - Schibonski, Jeff
AU - Werth, Aaron
AU - Hahn, Gary
AU - Piesciorovsky, Emilio
AU - Lee, Annabelle
PY - 2024/3
Y1 - 2024/3
N2 - Our task within the DarkNet project was to test the cyber resiliency of the Center for Alternate Synchronization and Timing’s (CAST) framework. We focused our testing on two of the core pieces of CAST’s implementation, a Juniper MX204 router and the Precision Time Protocol (PTP). In this report, we cover the following attempted methods of attack on our targets: ping flood, fork bomb, network protocol fuzzing, ARP poisoning, and IGMP spoofing. We found that delaying certain packets, specifically Delay Request, had a significant impact on the Offset from Master and Observed Drift timing statistics.
AB - Our task within the DarkNet project was to test the cyber resiliency of the Center for Alternate Synchronization and Timing’s (CAST) framework. We focused our testing on two of the core pieces of CAST’s implementation, a Juniper MX204 router and the Precision Time Protocol (PTP). In this report, we cover the following attempted methods of attack on our targets: ping flood, fork bomb, network protocol fuzzing, ARP poisoning, and IGMP spoofing. We found that delaying certain packets, specifically Delay Request, had a significant impact on the Offset from Master and Observed Drift timing statistics.
KW - 97 MATHEMATICS AND COMPUTING
U2 - 10.2172/2394729
DO - 10.2172/2394729
M3 - Commissioned report
BT - Cyber Resilience in the Cast Timing System
CY - United States
ER -