DocumentCode :
2882157
Title :
Vulnerabilities in the open shortest path first interior gateway protocol
Author :
McEachen, John C. ; Chesser, Robert L.
Author_Institution :
Dept. of Electr. & Comput. Eng., Naval Postgraduate Sch., Monterey, CA, USA
Volume :
2
fYear :
2000
fDate :
2000
Firstpage :
1224
Abstract :
In order to reduce the number of successful attacks against the US government´s computer networks, resources must be invested not only into implementing known fixes and security measures but also into the identification and correction of vulnerabilities before adversaries can exploit them. This thesis identifies one such vulnerability in the open shortest path first (OSPF) interior gateway protocol. This protocol is responsible for deciding which route network traffic will take, assuming multiple routes exist, in an autonomous system. This vulnerability spoofs routers running OSPF into altering the route that certain traffic takes without introducing abnormalities that would alert system administrators. In addition, this mode of deception can be continued indefinitely or reversed without alerting administrators
Keywords :
computer networks; internetworking; protocols; security of data; telecommunication network routing; telecommunication security; telecommunication traffic; OSPF; US government; autonomous system; computer networks; deception mode; network attacks; network security; network traffic routing; open shortest path first interior gateway protocol; protocol vulnerabilities; security measures; spoofed routers; Bandwidth; Computer networks; Computer security; Costs; Databases; Floods; Internet; Monitoring; Routing protocols; Telecommunication traffic;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
MILCOM 2000. 21st Century Military Communications Conference Proceedings
Conference_Location :
Los Angeles, CA
Print_ISBN :
0-7803-6521-6
Type :
conf
DOI :
10.1109/MILCOM.2000.904121
Filename :
904121
Link To Document :
بازگشت