Analyzer router: An approach to detect and recover from OSPF attacks

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Open Shortest Path First (OSPF) is the most widely deployed interior gateway routing protocol on the Internet. We here present an approach to detect the attacks to which OSPF is vulnerable. As security feature, OSPF uses “fightback” mechanism to detect false LSA flooded in network and take appropriate action. But few attacks have been proposed which bypass/overtake this mechanism to inject false LSA. And few attacks that are out of range of this mechanism. We will try to implement our approach to detect and mitigate these attacks. This approach is reactive so it may take small interval of time to detect and recover network from attack but is effective in doing so and securing the infrastructure.

Cite

CITATION STYLE

APA

Sangroha, D., & Gupta, V. (2014). Analyzer router: An approach to detect and recover from OSPF attacks. In Communications in Computer and Information Science (Vol. 467, pp. 370–378). Springer Verlag. https://doi.org/10.1007/978-3-662-44966-0_36

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free