On the Vulnerabilities and Protection of OSPF Routing Protocol
نویسندگان
چکیده
This paper analyzes both the strong points and weak points of OSPF routing protocol from security perspective. On its strong points, we abstract its features of information least dependency and information hiding, which make it very robust and fault resilient, even when facing certain malicious attacks. On its weak points, we take a pragmatic look at various problems centering round secure routing protocols. By carefully investigating a special re-routing attacking case, we show how an home-made malicious router can easily disrupt the service. It also provides a concrete example for routing protection and intrusion detection. Finally, we present the active protection idea and its architectural flexibility and compatibility advantages.
منابع مشابه
Digital signature protection of the OSPF routing protocol
The routing protocols used to disseminate routing information throughout the Internet are not protected from intruders or faulty router participants. This paper reports on work in progress to protect the OSPF routing protocol through the use of cryptography , speciically, digital signatures. The routing information is signed with an asymmetric cryptographic algorithm, allowing each router recip...
متن کاملPersistent OSPF Attacks
Open Shortest Path First (OSPF) is the most widely deployed interior gateway routing protocol on the Internet. We present two new attacks on OSPF that expose design vulnerabilities in the protocol specification. These new attacks can affect routing advertisements of routers not controlled by the attacker while evading the OSPF self-defense “fight-back” mechanism. By exploiting these vulnerabili...
متن کاملFinding Security Vulnerabilities in a Network Protocol Using Parameterized Systems
This paper presents a novel approach to automatically finding security vulnerabilities in the routing protocol OSPF – the most widely used protocol for Internet routing. We start by modeling OSPF on (concrete) networks with a fixed number of routers in a specific topology. By using the model checking tool CBMC, we found several simple, previously unpublished attacks on OSPF. In order to search ...
متن کاملAnaliza bezbednosnih mehanizama OSPF protokola
Service or system security depends on the security of any component used on that system. Computer network attacks can jeopardize normal network functionality. There are cases where an attacker can gain unauthorized control over classified data. OSPF is the most common link state routing protocol. In this paper, we have analyzed OSPF security issues and described some protection methods. Analysi...
متن کاملMicrosoft Word - 05_01_06.docx
In this paper, a proposal for implementation of novel routing protocols for IP radio networks at frequencies above 70 GHz is described. The protocols are designed to improve a network performance in the presence of the rain that has an intensity that causes a link down state and/or capacity reduction of some links in the network, but a network graph remains connected. New protocols, named OSPF-...
متن کامل