Open Shortest Path First (OSPF) is the most widely deployed interior gateway routing protocol on the Internet. We here present an approach to detect the attacks to which OSPF is vulnerable. As security feature, OSPF uses “fightback” mechanism to detect false LSA flooded in network and take appropriate action. But few attacks have been proposed which bypass/overtake this mechanism to inject false LSA. And few attacks that are out of range of this mechanism. We will try to implement our approach to detect and mitigate these attacks. This approach is reactive so it may take small interval of time to detect and recover network from attack but is effective in doing so and securing the infrastructure.
CITATION STYLE
Sangroha, D., & Gupta, V. (2014). Analyzer router: An approach to detect and recover from OSPF attacks. In Communications in Computer and Information Science (Vol. 467, pp. 370–378). Springer Verlag. https://doi.org/10.1007/978-3-662-44966-0_36
Mendeley helps you to discover research relevant for your work.