CFP last date
20 December 2024
Reseach Article

An Overview of OSPF and its Attack

Published on November 2015 by Ku. Sonali Dnyandeo Vairale
National Conference on Recent Trends in Mobile and Cloud Computing
Foundation of Computer Science USA
NCRMC2015 - Number 2
November 2015
Authors: Ku. Sonali Dnyandeo Vairale
e1cb76e5-c573-4e32-8627-5032f94631cc

Ku. Sonali Dnyandeo Vairale . An Overview of OSPF and its Attack. National Conference on Recent Trends in Mobile and Cloud Computing. NCRMC2015, 2 (November 2015), 15-18.

@article{
author = { Ku. Sonali Dnyandeo Vairale },
title = { An Overview of OSPF and its Attack },
journal = { National Conference on Recent Trends in Mobile and Cloud Computing },
issue_date = { November 2015 },
volume = { NCRMC2015 },
number = { 2 },
month = { November },
year = { 2015 },
issn = 0975-8887,
pages = { 15-18 },
numpages = 4,
url = { /proceedings/ncrmc2015/number2/23318-2916/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Recent Trends in Mobile and Cloud Computing
%A Ku. Sonali Dnyandeo Vairale
%T An Overview of OSPF and its Attack
%J National Conference on Recent Trends in Mobile and Cloud Computing
%@ 0975-8887
%V NCRMC2015
%N 2
%P 15-18
%D 2015
%I International Journal of Computer Applications
Abstract

Open Shortest Path First (OSPF) is the most broadly sent inside door directing convention on the Internet. We exhibit two new assaults on OSPF that uncover outline vulnerabilities in the convention particular. These new assaults can influence steering commercials of switches not controlled by the assailant while avoiding the OSPF self-protection "battle back" component. By abusing these vulnerabilities an aggressor can tirelessly misrepresent huge segments of the steering area's topology in this way giving the assailant control over how activity is directed in the space. This thus can prompt dissent of administration, listening stealthily, and man in the center assaults. We talk about various moderation techniques and propose an upgrade to the OSPF detail that thrashings these assaults and enhances general OSPF security.

References
  1. Cisco IOS emualtor. http://dynagen. org/.
  2. Graphical network simulator. http://www. gns3. net.
  3. A. S. Albert and A. Greenberg. Experience in blackbox ospf measurement. In In ACM SIGCOMM Internet Measurement Workshop (IMW), pages 113–125, 2001.
  4. R. Coltun and et. al. OSPF for IPv6. IETF RFC 5340, July 2008.
  5. E. W. Dijkstra. A note on two problems in connexion with graphs. Numerische Mathematik, 1:269–271, 1959.
  6. E. Jones and O. L. Moigne. OSPF Security Vulnerabilities Analysis. Internet-Draft draft-ietf-rpsec-ospf-vuln-02, IETF, June 2006.
  7. R. Mahajan, N. Spring, D. Wetherall, and T. Anderson. Inferring link weights using end-to-end measurements. In In ACM SIGCOMM Internet Measurement Workshop (IMW), November 2002.
  8. V. Manral and et. al. Issues with existing cryptographic protection methods for routing protocols. IETF RFC 6039, October 2010.
  9. J. Moy. OSPF version 2. IETF RFC 2328, April 1998.
  10. N. Spring, R. Mahajan, and D. Wetherall. Measuring ISP topologies with RocketFuel. In Proceedings of the ACM SIGCOMM, August 2002.
  11. F. Wang, B. Vetter, and S. F. Wu. Secure Routing Protocols: Theory and Practice. Technical report, North Carolina State University, May 1997.
Index Terms

Computer Science
Information Sciences

Keywords

Routing Ospf Enterprise Networks Lsa Traffic.