Availability Attacks Without an Adversary: Evidence from Enterprise LANs

📅 2026-02-04
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This study addresses a critical yet often overlooked issue in enterprise LANs: benign internal actions—such as frequent plugging and unplugging of endpoint devices—are frequently misclassified as security threats, inadvertently triggering Rapid Spanning Tree Protocol (RSTP) control-plane reconvergence. This results in transient forwarding interruptions lasting 2–4 seconds, which significantly disrupt real-time audiovisual services and evade detection by conventional monitoring systems. For the first time, this work maps such behavior to the NIST and MITRE insider threat frameworks, classifying it as “unintentional insider-induced availability disruption.” Through empirical analysis, the authors propose a targeted mitigation strategy: explicitly configuring edge ports effectively eliminates these brief outages caused by legitimate user activity, substantially enhancing network availability without compromising loop-prevention safeguards.

Technology Category

Application Category

📝 Abstract
Denial-of-Service (DoS) conditions in enterprise networks are commonly attributed to malicious actors. However, availability can also be compromised by benign non-malicious insider behavior. This paper presents an empirical study of a production enterprise LAN that demonstrates how routine docking and undocking of user endpoints repeatedly trigger rapid recalculations of the control plane of the Rapid Spanning Tree Protocol (RSTP) [1]. Although protocol-compliant and nonmalicious, these events introduce transient forwarding disruptions of approximately 2-4 seconds duration that degrade realtime streaming (voice and video) services while remaining largely undetected by conventional security monitoring. We map this phenomenon to the NIST and MITRE insider threat frameworks, characterizing it as an unintentional insider-driven availability breach, and demonstrate that explicit edge-port configuration effectively mitigates the condition without compromising loop prevention
Problem

Research questions and friction points this paper is trying to address.

Availability Attacks
Insider Threat
Rapid Spanning Tree Protocol
Denial-of-Service
Enterprise LANs
Innovation

Methods, ideas, or system contributions that make the work stand out.

unintentional insider threat
Rapid Spanning Tree Protocol (RSTP)
availability disruption
enterprise LAN
edge-port configuration
🔎 Similar Papers
No similar papers found.
Rajendra Paudyal
Rajendra Paudyal
George Mason University
Next Generation Network(5G/6G)AI/MLSecurity&PrivacyWireless Communication
R
Rajendra Upadhyay
Mason Innovation Labs, George Mason University, Fairfax, VA 22030, USA
Al Nahian Bin Emran
Al Nahian Bin Emran
Pursuing Ph.D. in Information Technology , George Mason University
Network and SecurityCybersecurityDeep LearningMachine LearningLLM
L
Lisa Donnan
Mason Innovation Labs, George Mason University, Fairfax, VA 22030, USA
D
D. Wijesekera
Mason Innovation Labs, George Mason University, Fairfax, VA 22030, USA