SlideShare a Scribd company logo
1 of 12
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 342
Vulnerability Exploitation in the Open Shortest Path First Protocol
Ahmed M. Faisal*, Dr. Nada Hussein M. Ali
-------------------------------------------------------------------------***--------------------------------------------------------------------
Abstract
Open Shortest Path First (OSPF) is one of the most popular interior gateway routing protocols. It uses a link state rout-
ing algorithm. OSPF neighbors need to be able to send and receive broadcast 'hello' packets to each other to begin estab-
lishing neighbor adjacency, OSPF is vulnerable to insider attacks. For this reason, the attacker within the network can col-
lect the hello message and modify it before resending it to the target device and establishing a neighbor relationship with
it. which will be sufficient to redirect traffic. This paper presents two types of attacks; a man-in-the-middle MIMD attack
and a denial-of-service DOS attack against the OSPF protocol and studies the influence of these attacks on protocol per-
formance. The experiment work was executed in a simulation environment for attacks against OSPF using a real-world
experiment (hands-on lab). Besides, it has been used a network topology that is fully connected by OSPF configured on real
Cisco IOS images via different hardware routers and firewalls has been used for that purpose.
The obtained results from the Experiment Hands-on lab show how the attacker inside the network can listen to and
intercept messages that are related to the OSPF protocol and how sending these messages again can affect the direction of
network traffic direction. This will make the attacker able to read the traffic that he was not able to read it before.
Keywords: OSPF Exploitation, Vulnerability, Attack experiment, Simulation, Cisco Attack
1. INTRODUCTION
Nowadays, computer network has been widely used in many aspects of human life and network security is becoming
more essential to all companies and institutions using the Internet [1]. The transmission of information through networks
has become very important due to its advantages in facilitating the demands of nowadays through improving methods of
storing and distributing information. This, in turn, has resulted in a rise in information issues and threats that compromise
the integrity of the information of the institution and can be implemented in distributed systems environments [2].
Network security is the set of policies and practices adopted by a network administrator to protect the network from
unauthorized access, security breaches, and unauthorized network intrusion [3].
A network protocol is a routing protocol defines the way packets are forwarded in a network. Routing protocols are used
by routers to communicate with their neighbors, then creating routing tables depending on the data they obtain. Every
device in the network is involved in the routing protocols' operation. A huge number of devices will be affected once the
protocol is exposed. Routing protocols such RIP, OSPF, IS-IS, and BGP are often used [16].
Interior Gateway Routing (IGP) Protocol (OSPF) is the most popular and widely used IGP protocol on the internet. IGP
enables routers within an autonomous system (AS) to build their routing tables, while adapting to changes in the topology
of the autonomous system. There are different types of OSPF packets. a router will use the "hello" packet to find out who its
neighbors are. The database description packet and link state request packet synchronize two router’s databases when
initiating an adjacency. The link-state update packet updates two routers’ link state database. The link state
acknowledgment packet confirms a reliable transfer by acknowledging a flooded LSAs. [4][5][6][7][8]. Figure 1 clarifies
how OSPF sets up adjacency between two routers in the network.
.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 343
Figure 1. An example of setting up adjacencies between two OSPF routers [8].
Path spoofing constitutes a hazardous form of cyber-attack whereby an individual seeks to manipulate a computer or
network to imitate other networks by assuming the identity of an authorized user and counterfeiting the Link State Adver-
tisements (LSAs). The functionality of LSAs is predominantly reliant on the OSPF routing protocol, which utilizes a vulner-
able protocol to alter tracking data and is frequently exploited for launching denial-of-service attacks [17].
The attacker manages to dispatch LSAs to the routers within the routing domain, with these routers erroneously
recognizing them as authentic LSAs. In extensive scenarios encompassing service provider and enterprise networks, the
subnet's gateway commonly operates as an OSPF node in core networks. Networks often possess roughly fifty percent of
the broadcast "Hello" packets in a state of "passive disabled," effectively rendering them inactive. As a result, the host can
capture the "hello" packets from these subsets, thereby extracting valuable network parameters from the adjacent routers.
Armed with these network parameters, the attacker can fabricate counterfeit LSAs to deceitfully manipulate the routing
tables across the entire OSPF network [9][10][12]. Among the most severe forms of attack is the manipulation of LSAs,
where there exist two variants: self-LSA and other-LSA falsification. Self-LSA manipulation occurs when an attacker within
a router fabricates an LSA connected to that specific router. Conversely, other-LSA falsification takes place when an
attacker compels a target router to dispatch a fraudulent LSA on behalf of a victim router within the same Autonomous
System (AS). To mitigate LSA attacks, OSPF incorporates several mechanisms, including flooding, a counter-response
mechanism, link authentication, and employment of digital signatures. [8][11][18].
2. related works
Some of the related works that demonstrate the OSPF protocol vulnerability are shows as in the following:
Gabi Nakibly et al. (2014) [12], This work includes manual analysis and formal verification of OSPF specifications for
additional vulnerabilities in the system’s flight-back mechanism. The analysis showed that OSPF has a basic security flaw
that makes it easy for an hacker to get around the flight-back mechanism. The vulnerability was confirmed by the majority
of the leading router vendors. However, the findings of the analysis suggest that there are unlikely to be any other
vulnerabilities with the flight-back mechanism.
Esmail Kaffashi et al. (2015) [13], Attacks on this protocol consist of LSA fake router that are controlled by the attacker.
These attacks affect the routing domain portion of the protocol or cause serious harm based on the router’s strategic
location in the AS for bringing domain routing. The attacks that It's a type of attack that can cause a lot of damage to a
network's security, and even though it has a fight-back feature, it won't have any effect on the routing domain. Basically, it's
an attack that can change the routing domain's routing table with malicious threats without the fight back mechanism
being turned on.
Yubo SONG et al. (2017) [14], The two most commonly used attacks to alter routing tables are adjacency spoofing and
single path injection, which involve the injection of malicious (LSAs). Results from real-world experiments demonstrate
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 344
that these two attacks are capable of effectively altering routing tables of routers. This can result in DNS, spam, phishing
website, interception, and man in the middle attacks. In addition, set up a vulnerability detection system to see if there are
any existing vulnerabilities with the routing protocol used in the real-world routers.
Nan Li et al. (2018) [15], Conduct simulations involving the OSPF protocol to replicate instances of the Phantom Router's
remote false adjacency attack and the concealed LSA attack. Evaluate the distinct traits exhibited by these attacks and
subsequently assess their consequences through a comparative analysis. Drawing insights from the analysis outcomes,
devise a detection mechanism grounded in the principles of a Finite State Machine. This mechanism is intended to
accurately pinpoint the occurrences of the previously mentioned attacks. This undertaking contributes towards
establishing an extensive comprehension of the attacks as well as the protective measures within the OSPF protocol.
3. Lab and Environment configuring
By using the EVE-NG platform as a lab simulation, the design of the proposed work simulates a private network that is
fully connected and configured with OSPF as the main routing protocol. As depicted in Figure 2, the topology design of the
lab consists of two parts (left and right). The left side part represents the headquarters (HQ) that provides and supports
some of the services, such as DNS, mail service, and web service. All these services are installed on a Linux-Ubuntu server
to simulate a real work environment and will help read different types of traffic. The right-side part denotes the client side,
with the Windows 7 machine and two routers used and configured to provide a load balance in case one router are down.
Moreover, two Cisco Adaptive Security Appliances (ASA) are used in the design as gateways for each side of the network.
Figure 2. Network topology design.
3-1 Software to be required
Different types of software, operating systems, and simulation programs were being used in this work as described as
follows:
1- VMware Workstation 16.1.2 build-17966106
2- PNET_4.2.10
3- Cisco Router image 7200
4- Cisco ASA image ASAV-9-12-3
5- Cisco ASA image ASA-9-13-12
6- Cisco Switch i86bi-Linux-L2
7- Windows 7 (As Client)
8- Linux-Ubuntu distribution (As a Server)
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 345
4. The Framework of the proposed work
To establish the attacks against OSPF, a number of steps need to be fulfilled. First step, the attacker machine needs to
be inside the network to sense all the traffic passing through it. In the case of an attack on OSPF, it’s easy to sniff the
traffic because OSPF uses the multicast IP. After capturing the traffic, the second step is to choose the appropriate packet
from that traffic or just can try to use a different number packet and then can choose the more appropriate one. The third
step is to fuzz the packet and change some of the parameters. Using the Scapy tool to manipulate the OSPF parameters
and propagate the fake packet to the target device and wait to build a neighbor relationship with it. Figure 3 clarifies the
attacker's position in the network.
Figure 3. A network design clarifies attacker position.
Firstly, starting with capturing traffic that goes through the network and which is belonged to the OSPF protocol.
Thereafter, the OSPF protocol starts it needs to negotiate with neighbor devices OSPF by sending Hello messages
between each other to establish the neighbor relationship. Figure 4 clarifies the captured OSPF's messages.
Figure 4. OSPF's messages captured.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 346
At this time, after capturing the traffic and specifically traffic related to OSPF protocol there is a number of packets, only
one packet is enough to implement this attack. In a random manner, one can choose the packet and make some of
manipulating the parameters of that packet.
 Attack Preforming
Using the Python programming language and Scapy tool on a Kali-Linux machine would enable the user
To send a fake packet using the Scapy tool, the attacker will need to do the following steps:
1- The attacker will need to load the OSPF protocol contribution from Scapy’s library.
2- Load the captured packet.
3- Change the parameters of the original packet, like the IP of the source’s machine and others.
4- Send the fake packet.
After that, a new packet will be sent to the target device on the network. Figure 5 clarifies how to use the Scapy tool and
manipulate packet parameters. Moreover, Figure 6 describes how to send fake packets to the target by using the Scapy tool.
Figure 5. Parameters modification by Scapy tool.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 347
Figure 6. Fake packets sending.
5. Normal traffic Direction
To check the normal direction of traffic, it will use the client-side of the network and send Internet Control Message
Protocol (ICMP) from the Windows client machine to the server destination. Figure 7 shows how to send ICMP traffic
from client to server; the traffic would be moved through the interface e0/1 on Router-2. Although Figure 8 clarifies the
normal traffic direction before the attack been occurred,
Figure 7. Normal traffic direction from client side to a destination.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 348
Figure 8. Normal traffic direction.
6. Establish the new neighbored relationship
To check the normal direction of traffic, it will use the client-side on the network and send Internet Control Message
Protocol (ICMP) from the Windows-Client machine to the server destination. Figure 7 shows how to send ICMP traffic from
client to server, the traffic would be moved through the interface e0/1 on Router-2. Although, Figure 8. Clarifies the normal
traffic direction before the attack been occurred.
Figure 9. The relationship with the attacker’s machine inside the Router-1.
7. Checking OSPF Neighbor relationship status on network’s devices
To confirm that the state of neighbor relations on devices has indeed been affected and that the attacker's IP address
has also been added to the target devices. If the attacker uses different sourced packets, like packet number 8, which is
sourced from Router-1, the attacker will play the role of Router-1, which will create a neighbor relationship with both
Router2 and ASA-2. Figure 10 clarifies the state relationship with the attacker’s machine inside the Router-2. In addition,
Figure 11 shows the state relationship with the attacker’s machine inside Firewall 2.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 349
Figure 10. Neighbor relationship on Router-2.
Figure 11. Neighbor relationship on Firewall-2.
8. New Traffic Direction after Attack occurred
The new neighbor relationship between the attacker and target device can mainly affect the direction of traffic, the
direction of traffic will change after the attacker adds himself inside the OSPF as a neighbor. The traffic will move through
the attacker’s machine, from the inside of the attacker’s machine. Figure 12 describes the new direction of the traffic.
Figure 12. The new direction after attack.
As demonstrated in Figure 12, the attacker will be able to easily detect and sniff the traffic sourced from a client to a
server after the new traffic direction using the Wireshark network sniffer. Figure 13 shows how the attacker can read
and sniff the traffic.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 350
Figure 13. traffic redirection to Attacker’s machine.
8-1. DOS Attack
The change in traffic directly after the attack will affect the availability of the services since the number of packets will be
dropped, causing a denial-of-service (DoS). Figure 14 clarifies the dropping of a number of packets after using PING to
detect the destination.
Figure 14. A Denial-of-Service after attack.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 351
8-2 Captured Network Traffic
The change in traffic directly after the attack will affect the availability of the services since the number of packets will be
dropped, causing a denial-of-service (DoS). Figure 14 clarifies the dropping of a number of packets after using PING to
detect the destination.
Figure 15. How the attacker can read different type of packets.
More details and information about packets can be gotten by choosing a specific one. Figure 15 clarifies the DNS packet
that works on port 53 with the domain name (mail.local.net). whereas Figure 16 clarifies the DNS packet that works on
port 53 with the domain name (mail.local.net).
Figure 16. mail service from client.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 352
Conclusions
The attack on the OSPF protocol would be achieved by a variety of techniques. This paper is based on one of these
techniques, using a Python-based tool on Linux-Kali disruption. Any host inside the network is able to detect and sense the
multicast broadcast of the OSPF packets.
An attacker could use one of the sniffing programs to read and try the most appropriate packet that could establish a
neighbor relationship with the target device. After the neighbor relationship has been established between the target
device and the attacker, the attacker will be able to add his device to the OSPF’s state relationship. Not all OSPF parameters
on the fake packet are able to be modified, the OSPF protocol that was configured on the network devices would be able to
sense and detect the attack and the malformed packet. The fake packet needs to be sent within the interval of dead time;
otherwise, the neighbor will be down. After neighbor relations have been established, a lot of packets will be able to be
read and detected by the attacker. Based on traffic redirection A denial of service will take place, and the services on the
server will be impossible to reach.
REFERNCES
[1] D. I. Mahmood and S. M. Hameed, "A Multi-Objective Evolutionary Algorithm based Feature Selection for Intrusion
Detection," Iraqi Journal of Science , vol. 58, no.1C, pp. 536-549, 2017. doi:10.24996.ijs.2017.58.1C.16.
[2] T. A. Khaleel and A. A. Al-Shumam, "A study of graph theory applications in it security," Iraqi Journal of Science, vol.
61, no.10, pp. 2705-2714, Oct. 2020. Doi: 10.24996/ijs.2020.61.10.28.
[3] M. Abdulkadhim and S. Hasan, "Boosting the Network Performance using Two Security Measure Scenarios for Service
Provider Network," Iraqi Journal of Science, pp. 174-179, Jan. 2021. doi: 10.24996/ijs.2021.SI.1.24.
[4] F. Wang and S. F. Wu, " On the vulnerabilities and protection of OSPF routing protocol," In Proceedings 7th
International Conference on Computer Communications and Networks, 1998.
[5] A. Kirshon, D. Gonikman and G. Nakibly, " Owning the Routing Table New OSPF Attacks," BlackHat Briefings and
Trainings USA, pp.1-18, Nov. 2011.
[6] J. Deng, S. Wu and K. Sun, "Comparison of RIP, OSPF and EIGRP Routing Protocols based on OPNET," Simon Fraser
University School of Engineering Science , 2014. Available:
https://www.sfu.ca/~ljilja/ENSC427/Spring14/Projects/team9/ENSC427_team9_report.pdf
[7] P. Anu, and S. Vimala, "Optimization of OSPF LSA flooding process using clustering technique," in proceeding of the
2016 10th International Conference on Intelligent Systems and Control (ISCO), 2016.
[8] B. Al-Musawi, P. Bransh, M. F. Hassan and S. R. Pokhrel, "dentifying OSPF LSA falsification attacks through non-linear
analysis," Computer Networks, p.107031, Feb. 2020 .
[9] B. Vetter, F. Wang and S. F. WU, " An experimental study of insider attacks for OSPF routing protocol," In Proceedings
1997 International Conference on Network Protocols, pp. 293-300.
[10] D. S. Robbins, " Using Protocol Redundancy to Enhance OSPF Network System Survivability," in Southeast
Conference, pp. 1-7, Apr. 2018. doi: 10.1109/SECON.2018.8479134.
[11] D. Sangroha, and V. Gupta, " An Approach to Detect and Recover from OSPF Attacks. In Security in Computing and
Communications," Second International Symposium, SSCC, Delhi, India, 2014.
[12] G. Nakibly, A. Sosnovich, E. Menahem, A. Waizel, and Y. Elovici, "OSPF vulnerability to persistent poisoning attacks: a
systematic analysis," In Proceedings of the 30th Annual Computer security applications Conference, pp. 336-345, 2014.
doi:10.1145/2664243.2664278.
[13] E. Kaffashi, A. Mousavi, H. Rahvard, S. H. Bojnordi, F. Khademsadegh, and S. Amirian, " A new attack on link-state
database in open shortest path first routing protocol," Journal of Electrical and Electronic Engineering, pp.39-45, 2015. doi:
10.11648/j.jeee. s.2015030201.19.
[14] Y. Song, S. Gao, A. Hu and B. Xiao, "Novel attacks in OSPF networks to poison routing table," IEEE International
Conference on Communications (ICC), pp.1-6, 2017. doi: 10.1109/ICC.2017.7996829
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 353
[15] N. Li, Y. Liu, and Z. Lu, " Research on Analysis and Detection Technology for Several Attacks of OSPF Vulnerability,"
International Conference on Transportation & Logistics, Information & Communication, Smart City, pp.299-303, 2018. doi:
10.2991/tlicsc-18.2018.48.
[16]. C. Wen, Y. Liu S. Li, "A Routing Protocols Fuzzing Method based on MAN-IN-THE-MIDDLE," In 2022 2nd International
Conference on Frontiers of Electronics, Information and Computation Technologies (ICFEICT), pp. 491-496, 2022. doi:
10.1109/ICFEICT57213.2022.00092.
[17]. H. Sawalmeh, M. Malayshi, S. Ahmed, and A. Awad, "VPN Remote Access OSPF-based VPN Security Vulnerabilities and
Counter Measurements," International Conference on Innovation and Intelligence for Informatics, Computing, and
Technologies (3ICT), pp.236-241, Sep. 2021. doi:10.1109/3ICT53449.2021.9581512.
[18] R. Meredith, and R. Dutta, "Increasing Network Resilience to Persistent OSPF Attacks," IEEE International Conference
on Communications (ICC), pp. 1-7, May. 2019. doi:10.1109/ICC.2019.8761838.

More Related Content

Similar to Vulnerability Exploitation in the Open Shortest Path First Protocol

IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2IRJET Journal
 
IRJET- Detection of Black Hole Attacks in AODV Routing Protocol in MANET
IRJET- Detection of Black Hole Attacks in AODV Routing Protocol in MANETIRJET- Detection of Black Hole Attacks in AODV Routing Protocol in MANET
IRJET- Detection of Black Hole Attacks in AODV Routing Protocol in MANETIRJET Journal
 
PROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKS
PROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKSPROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKS
PROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKSZac Darcy
 
Protector Control PC-AODV-BH in the Ad Hoc Networks
Protector Control PC-AODV-BH in the Ad Hoc NetworksProtector Control PC-AODV-BH in the Ad Hoc Networks
Protector Control PC-AODV-BH in the Ad Hoc NetworksZac Darcy
 
Protector Control PC-AODV-BH in the Ad Hoc Networks
Protector Control PC-AODV-BH in the Ad Hoc NetworksProtector Control PC-AODV-BH in the Ad Hoc Networks
Protector Control PC-AODV-BH in the Ad Hoc NetworksZac Darcy
 
PROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKS
PROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKSPROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKS
PROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKSZac Darcy
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”Alexander Decker
 
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks IJNSA Journal
 
A Survey on Black Hole & Gray Hole Attacks Detection Scheme for Vehicular Ad-...
A Survey on Black Hole & Gray Hole Attacks Detection Scheme for Vehicular Ad-...A Survey on Black Hole & Gray Hole Attacks Detection Scheme for Vehicular Ad-...
A Survey on Black Hole & Gray Hole Attacks Detection Scheme for Vehicular Ad-...IRJET Journal
 
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...IRJET Journal
 
Enhancing network security and performance using optimized acls
Enhancing network security and performance using optimized aclsEnhancing network security and performance using optimized acls
Enhancing network security and performance using optimized aclsijfcstjournal
 
Improving Performance of Data Routing Protocol in Flying Ad-Hoc Networks
Improving Performance of Data Routing Protocol in Flying Ad-Hoc NetworksImproving Performance of Data Routing Protocol in Flying Ad-Hoc Networks
Improving Performance of Data Routing Protocol in Flying Ad-Hoc NetworksIRJET Journal
 
Design & Implementation of Secure AODV In Multicast Routing To Detect DDOS At...
Design & Implementation of Secure AODV In Multicast Routing To Detect DDOS At...Design & Implementation of Secure AODV In Multicast Routing To Detect DDOS At...
Design & Implementation of Secure AODV In Multicast Routing To Detect DDOS At...IJNSA Journal
 
The Robust system for antivenin DDOS by Rioter Puddle Expertise
The Robust system for antivenin DDOS by Rioter Puddle ExpertiseThe Robust system for antivenin DDOS by Rioter Puddle Expertise
The Robust system for antivenin DDOS by Rioter Puddle ExpertiseAM Publications
 
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKSRTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKSIJNSA Journal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 

Similar to Vulnerability Exploitation in the Open Shortest Path First Protocol (20)

IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
 
IRJET- Detection of Black Hole Attacks in AODV Routing Protocol in MANET
IRJET- Detection of Black Hole Attacks in AODV Routing Protocol in MANETIRJET- Detection of Black Hole Attacks in AODV Routing Protocol in MANET
IRJET- Detection of Black Hole Attacks in AODV Routing Protocol in MANET
 
2009 2-ospf-report
2009 2-ospf-report2009 2-ospf-report
2009 2-ospf-report
 
40120140507001
4012014050700140120140507001
40120140507001
 
40120140507001
4012014050700140120140507001
40120140507001
 
PROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKS
PROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKSPROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKS
PROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKS
 
Protector Control PC-AODV-BH in the Ad Hoc Networks
Protector Control PC-AODV-BH in the Ad Hoc NetworksProtector Control PC-AODV-BH in the Ad Hoc Networks
Protector Control PC-AODV-BH in the Ad Hoc Networks
 
Protector Control PC-AODV-BH in the Ad Hoc Networks
Protector Control PC-AODV-BH in the Ad Hoc NetworksProtector Control PC-AODV-BH in the Ad Hoc Networks
Protector Control PC-AODV-BH in the Ad Hoc Networks
 
PROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKS
PROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKSPROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKS
PROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKS
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks
 
A Survey on Black Hole & Gray Hole Attacks Detection Scheme for Vehicular Ad-...
A Survey on Black Hole & Gray Hole Attacks Detection Scheme for Vehicular Ad-...A Survey on Black Hole & Gray Hole Attacks Detection Scheme for Vehicular Ad-...
A Survey on Black Hole & Gray Hole Attacks Detection Scheme for Vehicular Ad-...
 
Ijariie1170
Ijariie1170Ijariie1170
Ijariie1170
 
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
 
Enhancing network security and performance using optimized acls
Enhancing network security and performance using optimized aclsEnhancing network security and performance using optimized acls
Enhancing network security and performance using optimized acls
 
Improving Performance of Data Routing Protocol in Flying Ad-Hoc Networks
Improving Performance of Data Routing Protocol in Flying Ad-Hoc NetworksImproving Performance of Data Routing Protocol in Flying Ad-Hoc Networks
Improving Performance of Data Routing Protocol in Flying Ad-Hoc Networks
 
Design & Implementation of Secure AODV In Multicast Routing To Detect DDOS At...
Design & Implementation of Secure AODV In Multicast Routing To Detect DDOS At...Design & Implementation of Secure AODV In Multicast Routing To Detect DDOS At...
Design & Implementation of Secure AODV In Multicast Routing To Detect DDOS At...
 
The Robust system for antivenin DDOS by Rioter Puddle Expertise
The Robust system for antivenin DDOS by Rioter Puddle ExpertiseThe Robust system for antivenin DDOS by Rioter Puddle Expertise
The Robust system for antivenin DDOS by Rioter Puddle Expertise
 
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKSRTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxkalpana413121
 
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and ToolsMaximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Toolssoginsider
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfJNTUA
 
Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashidFaiyazSheikh
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docxrahulmanepalli02
 
engineering chemistry power point presentation
engineering chemistry  power point presentationengineering chemistry  power point presentation
engineering chemistry power point presentationsj9399037128
 
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样A
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...ronahami
 
handbook on reinforce concrete and detailing
handbook on reinforce concrete and detailinghandbook on reinforce concrete and detailing
handbook on reinforce concrete and detailingAshishSingh1301
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
Working Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfWorking Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfSkNahidulIslamShrabo
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxMustafa Ahmed
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxMustafa Ahmed
 
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxMustafa Ahmed
 
Databricks Generative AI Fundamentals .pdf
Databricks Generative AI Fundamentals  .pdfDatabricks Generative AI Fundamentals  .pdf
Databricks Generative AI Fundamentals .pdfVinayVadlagattu
 
Presentation on Slab, Beam, Column, and Foundation/Footing
Presentation on Slab,  Beam, Column, and Foundation/FootingPresentation on Slab,  Beam, Column, and Foundation/Footing
Presentation on Slab, Beam, Column, and Foundation/FootingEr. Suman Jyoti
 
Databricks Generative AI FoundationCertified.pdf
Databricks Generative AI FoundationCertified.pdfDatabricks Generative AI FoundationCertified.pdf
Databricks Generative AI FoundationCertified.pdfVinayVadlagattu
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书
一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书
一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书c3384a92eb32
 
Dynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxDynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxMustafa Ahmed
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsMathias Magdowski
 

Recently uploaded (20)

UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and ToolsMaximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
 
Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded Systems
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
 
engineering chemistry power point presentation
engineering chemistry  power point presentationengineering chemistry  power point presentation
engineering chemistry power point presentation
 
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
一比一原版(NEU毕业证书)东北大学毕业证成绩单原件一模一样
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
handbook on reinforce concrete and detailing
handbook on reinforce concrete and detailinghandbook on reinforce concrete and detailing
handbook on reinforce concrete and detailing
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Working Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfWorking Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdf
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptx
 
Databricks Generative AI Fundamentals .pdf
Databricks Generative AI Fundamentals  .pdfDatabricks Generative AI Fundamentals  .pdf
Databricks Generative AI Fundamentals .pdf
 
Presentation on Slab, Beam, Column, and Foundation/Footing
Presentation on Slab,  Beam, Column, and Foundation/FootingPresentation on Slab,  Beam, Column, and Foundation/Footing
Presentation on Slab, Beam, Column, and Foundation/Footing
 
Databricks Generative AI FoundationCertified.pdf
Databricks Generative AI FoundationCertified.pdfDatabricks Generative AI FoundationCertified.pdf
Databricks Generative AI FoundationCertified.pdf
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书
一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书
一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书
 
Dynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxDynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptx
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility Applications
 

Vulnerability Exploitation in the Open Shortest Path First Protocol

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 342 Vulnerability Exploitation in the Open Shortest Path First Protocol Ahmed M. Faisal*, Dr. Nada Hussein M. Ali -------------------------------------------------------------------------***-------------------------------------------------------------------- Abstract Open Shortest Path First (OSPF) is one of the most popular interior gateway routing protocols. It uses a link state rout- ing algorithm. OSPF neighbors need to be able to send and receive broadcast 'hello' packets to each other to begin estab- lishing neighbor adjacency, OSPF is vulnerable to insider attacks. For this reason, the attacker within the network can col- lect the hello message and modify it before resending it to the target device and establishing a neighbor relationship with it. which will be sufficient to redirect traffic. This paper presents two types of attacks; a man-in-the-middle MIMD attack and a denial-of-service DOS attack against the OSPF protocol and studies the influence of these attacks on protocol per- formance. The experiment work was executed in a simulation environment for attacks against OSPF using a real-world experiment (hands-on lab). Besides, it has been used a network topology that is fully connected by OSPF configured on real Cisco IOS images via different hardware routers and firewalls has been used for that purpose. The obtained results from the Experiment Hands-on lab show how the attacker inside the network can listen to and intercept messages that are related to the OSPF protocol and how sending these messages again can affect the direction of network traffic direction. This will make the attacker able to read the traffic that he was not able to read it before. Keywords: OSPF Exploitation, Vulnerability, Attack experiment, Simulation, Cisco Attack 1. INTRODUCTION Nowadays, computer network has been widely used in many aspects of human life and network security is becoming more essential to all companies and institutions using the Internet [1]. The transmission of information through networks has become very important due to its advantages in facilitating the demands of nowadays through improving methods of storing and distributing information. This, in turn, has resulted in a rise in information issues and threats that compromise the integrity of the information of the institution and can be implemented in distributed systems environments [2]. Network security is the set of policies and practices adopted by a network administrator to protect the network from unauthorized access, security breaches, and unauthorized network intrusion [3]. A network protocol is a routing protocol defines the way packets are forwarded in a network. Routing protocols are used by routers to communicate with their neighbors, then creating routing tables depending on the data they obtain. Every device in the network is involved in the routing protocols' operation. A huge number of devices will be affected once the protocol is exposed. Routing protocols such RIP, OSPF, IS-IS, and BGP are often used [16]. Interior Gateway Routing (IGP) Protocol (OSPF) is the most popular and widely used IGP protocol on the internet. IGP enables routers within an autonomous system (AS) to build their routing tables, while adapting to changes in the topology of the autonomous system. There are different types of OSPF packets. a router will use the "hello" packet to find out who its neighbors are. The database description packet and link state request packet synchronize two router’s databases when initiating an adjacency. The link-state update packet updates two routers’ link state database. The link state acknowledgment packet confirms a reliable transfer by acknowledging a flooded LSAs. [4][5][6][7][8]. Figure 1 clarifies how OSPF sets up adjacency between two routers in the network. .
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 343 Figure 1. An example of setting up adjacencies between two OSPF routers [8]. Path spoofing constitutes a hazardous form of cyber-attack whereby an individual seeks to manipulate a computer or network to imitate other networks by assuming the identity of an authorized user and counterfeiting the Link State Adver- tisements (LSAs). The functionality of LSAs is predominantly reliant on the OSPF routing protocol, which utilizes a vulner- able protocol to alter tracking data and is frequently exploited for launching denial-of-service attacks [17]. The attacker manages to dispatch LSAs to the routers within the routing domain, with these routers erroneously recognizing them as authentic LSAs. In extensive scenarios encompassing service provider and enterprise networks, the subnet's gateway commonly operates as an OSPF node in core networks. Networks often possess roughly fifty percent of the broadcast "Hello" packets in a state of "passive disabled," effectively rendering them inactive. As a result, the host can capture the "hello" packets from these subsets, thereby extracting valuable network parameters from the adjacent routers. Armed with these network parameters, the attacker can fabricate counterfeit LSAs to deceitfully manipulate the routing tables across the entire OSPF network [9][10][12]. Among the most severe forms of attack is the manipulation of LSAs, where there exist two variants: self-LSA and other-LSA falsification. Self-LSA manipulation occurs when an attacker within a router fabricates an LSA connected to that specific router. Conversely, other-LSA falsification takes place when an attacker compels a target router to dispatch a fraudulent LSA on behalf of a victim router within the same Autonomous System (AS). To mitigate LSA attacks, OSPF incorporates several mechanisms, including flooding, a counter-response mechanism, link authentication, and employment of digital signatures. [8][11][18]. 2. related works Some of the related works that demonstrate the OSPF protocol vulnerability are shows as in the following: Gabi Nakibly et al. (2014) [12], This work includes manual analysis and formal verification of OSPF specifications for additional vulnerabilities in the system’s flight-back mechanism. The analysis showed that OSPF has a basic security flaw that makes it easy for an hacker to get around the flight-back mechanism. The vulnerability was confirmed by the majority of the leading router vendors. However, the findings of the analysis suggest that there are unlikely to be any other vulnerabilities with the flight-back mechanism. Esmail Kaffashi et al. (2015) [13], Attacks on this protocol consist of LSA fake router that are controlled by the attacker. These attacks affect the routing domain portion of the protocol or cause serious harm based on the router’s strategic location in the AS for bringing domain routing. The attacks that It's a type of attack that can cause a lot of damage to a network's security, and even though it has a fight-back feature, it won't have any effect on the routing domain. Basically, it's an attack that can change the routing domain's routing table with malicious threats without the fight back mechanism being turned on. Yubo SONG et al. (2017) [14], The two most commonly used attacks to alter routing tables are adjacency spoofing and single path injection, which involve the injection of malicious (LSAs). Results from real-world experiments demonstrate
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 344 that these two attacks are capable of effectively altering routing tables of routers. This can result in DNS, spam, phishing website, interception, and man in the middle attacks. In addition, set up a vulnerability detection system to see if there are any existing vulnerabilities with the routing protocol used in the real-world routers. Nan Li et al. (2018) [15], Conduct simulations involving the OSPF protocol to replicate instances of the Phantom Router's remote false adjacency attack and the concealed LSA attack. Evaluate the distinct traits exhibited by these attacks and subsequently assess their consequences through a comparative analysis. Drawing insights from the analysis outcomes, devise a detection mechanism grounded in the principles of a Finite State Machine. This mechanism is intended to accurately pinpoint the occurrences of the previously mentioned attacks. This undertaking contributes towards establishing an extensive comprehension of the attacks as well as the protective measures within the OSPF protocol. 3. Lab and Environment configuring By using the EVE-NG platform as a lab simulation, the design of the proposed work simulates a private network that is fully connected and configured with OSPF as the main routing protocol. As depicted in Figure 2, the topology design of the lab consists of two parts (left and right). The left side part represents the headquarters (HQ) that provides and supports some of the services, such as DNS, mail service, and web service. All these services are installed on a Linux-Ubuntu server to simulate a real work environment and will help read different types of traffic. The right-side part denotes the client side, with the Windows 7 machine and two routers used and configured to provide a load balance in case one router are down. Moreover, two Cisco Adaptive Security Appliances (ASA) are used in the design as gateways for each side of the network. Figure 2. Network topology design. 3-1 Software to be required Different types of software, operating systems, and simulation programs were being used in this work as described as follows: 1- VMware Workstation 16.1.2 build-17966106 2- PNET_4.2.10 3- Cisco Router image 7200 4- Cisco ASA image ASAV-9-12-3 5- Cisco ASA image ASA-9-13-12 6- Cisco Switch i86bi-Linux-L2 7- Windows 7 (As Client) 8- Linux-Ubuntu distribution (As a Server)
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 345 4. The Framework of the proposed work To establish the attacks against OSPF, a number of steps need to be fulfilled. First step, the attacker machine needs to be inside the network to sense all the traffic passing through it. In the case of an attack on OSPF, it’s easy to sniff the traffic because OSPF uses the multicast IP. After capturing the traffic, the second step is to choose the appropriate packet from that traffic or just can try to use a different number packet and then can choose the more appropriate one. The third step is to fuzz the packet and change some of the parameters. Using the Scapy tool to manipulate the OSPF parameters and propagate the fake packet to the target device and wait to build a neighbor relationship with it. Figure 3 clarifies the attacker's position in the network. Figure 3. A network design clarifies attacker position. Firstly, starting with capturing traffic that goes through the network and which is belonged to the OSPF protocol. Thereafter, the OSPF protocol starts it needs to negotiate with neighbor devices OSPF by sending Hello messages between each other to establish the neighbor relationship. Figure 4 clarifies the captured OSPF's messages. Figure 4. OSPF's messages captured.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 346 At this time, after capturing the traffic and specifically traffic related to OSPF protocol there is a number of packets, only one packet is enough to implement this attack. In a random manner, one can choose the packet and make some of manipulating the parameters of that packet.  Attack Preforming Using the Python programming language and Scapy tool on a Kali-Linux machine would enable the user To send a fake packet using the Scapy tool, the attacker will need to do the following steps: 1- The attacker will need to load the OSPF protocol contribution from Scapy’s library. 2- Load the captured packet. 3- Change the parameters of the original packet, like the IP of the source’s machine and others. 4- Send the fake packet. After that, a new packet will be sent to the target device on the network. Figure 5 clarifies how to use the Scapy tool and manipulate packet parameters. Moreover, Figure 6 describes how to send fake packets to the target by using the Scapy tool. Figure 5. Parameters modification by Scapy tool.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 347 Figure 6. Fake packets sending. 5. Normal traffic Direction To check the normal direction of traffic, it will use the client-side of the network and send Internet Control Message Protocol (ICMP) from the Windows client machine to the server destination. Figure 7 shows how to send ICMP traffic from client to server; the traffic would be moved through the interface e0/1 on Router-2. Although Figure 8 clarifies the normal traffic direction before the attack been occurred, Figure 7. Normal traffic direction from client side to a destination.
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 348 Figure 8. Normal traffic direction. 6. Establish the new neighbored relationship To check the normal direction of traffic, it will use the client-side on the network and send Internet Control Message Protocol (ICMP) from the Windows-Client machine to the server destination. Figure 7 shows how to send ICMP traffic from client to server, the traffic would be moved through the interface e0/1 on Router-2. Although, Figure 8. Clarifies the normal traffic direction before the attack been occurred. Figure 9. The relationship with the attacker’s machine inside the Router-1. 7. Checking OSPF Neighbor relationship status on network’s devices To confirm that the state of neighbor relations on devices has indeed been affected and that the attacker's IP address has also been added to the target devices. If the attacker uses different sourced packets, like packet number 8, which is sourced from Router-1, the attacker will play the role of Router-1, which will create a neighbor relationship with both Router2 and ASA-2. Figure 10 clarifies the state relationship with the attacker’s machine inside the Router-2. In addition, Figure 11 shows the state relationship with the attacker’s machine inside Firewall 2.
  • 8. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 349 Figure 10. Neighbor relationship on Router-2. Figure 11. Neighbor relationship on Firewall-2. 8. New Traffic Direction after Attack occurred The new neighbor relationship between the attacker and target device can mainly affect the direction of traffic, the direction of traffic will change after the attacker adds himself inside the OSPF as a neighbor. The traffic will move through the attacker’s machine, from the inside of the attacker’s machine. Figure 12 describes the new direction of the traffic. Figure 12. The new direction after attack. As demonstrated in Figure 12, the attacker will be able to easily detect and sniff the traffic sourced from a client to a server after the new traffic direction using the Wireshark network sniffer. Figure 13 shows how the attacker can read and sniff the traffic.
  • 9. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 350 Figure 13. traffic redirection to Attacker’s machine. 8-1. DOS Attack The change in traffic directly after the attack will affect the availability of the services since the number of packets will be dropped, causing a denial-of-service (DoS). Figure 14 clarifies the dropping of a number of packets after using PING to detect the destination. Figure 14. A Denial-of-Service after attack.
  • 10. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 351 8-2 Captured Network Traffic The change in traffic directly after the attack will affect the availability of the services since the number of packets will be dropped, causing a denial-of-service (DoS). Figure 14 clarifies the dropping of a number of packets after using PING to detect the destination. Figure 15. How the attacker can read different type of packets. More details and information about packets can be gotten by choosing a specific one. Figure 15 clarifies the DNS packet that works on port 53 with the domain name (mail.local.net). whereas Figure 16 clarifies the DNS packet that works on port 53 with the domain name (mail.local.net). Figure 16. mail service from client.
  • 11. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 352 Conclusions The attack on the OSPF protocol would be achieved by a variety of techniques. This paper is based on one of these techniques, using a Python-based tool on Linux-Kali disruption. Any host inside the network is able to detect and sense the multicast broadcast of the OSPF packets. An attacker could use one of the sniffing programs to read and try the most appropriate packet that could establish a neighbor relationship with the target device. After the neighbor relationship has been established between the target device and the attacker, the attacker will be able to add his device to the OSPF’s state relationship. Not all OSPF parameters on the fake packet are able to be modified, the OSPF protocol that was configured on the network devices would be able to sense and detect the attack and the malformed packet. The fake packet needs to be sent within the interval of dead time; otherwise, the neighbor will be down. After neighbor relations have been established, a lot of packets will be able to be read and detected by the attacker. Based on traffic redirection A denial of service will take place, and the services on the server will be impossible to reach. REFERNCES [1] D. I. Mahmood and S. M. Hameed, "A Multi-Objective Evolutionary Algorithm based Feature Selection for Intrusion Detection," Iraqi Journal of Science , vol. 58, no.1C, pp. 536-549, 2017. doi:10.24996.ijs.2017.58.1C.16. [2] T. A. Khaleel and A. A. Al-Shumam, "A study of graph theory applications in it security," Iraqi Journal of Science, vol. 61, no.10, pp. 2705-2714, Oct. 2020. Doi: 10.24996/ijs.2020.61.10.28. [3] M. Abdulkadhim and S. Hasan, "Boosting the Network Performance using Two Security Measure Scenarios for Service Provider Network," Iraqi Journal of Science, pp. 174-179, Jan. 2021. doi: 10.24996/ijs.2021.SI.1.24. [4] F. Wang and S. F. Wu, " On the vulnerabilities and protection of OSPF routing protocol," In Proceedings 7th International Conference on Computer Communications and Networks, 1998. [5] A. Kirshon, D. Gonikman and G. Nakibly, " Owning the Routing Table New OSPF Attacks," BlackHat Briefings and Trainings USA, pp.1-18, Nov. 2011. [6] J. Deng, S. Wu and K. Sun, "Comparison of RIP, OSPF and EIGRP Routing Protocols based on OPNET," Simon Fraser University School of Engineering Science , 2014. Available: https://www.sfu.ca/~ljilja/ENSC427/Spring14/Projects/team9/ENSC427_team9_report.pdf [7] P. Anu, and S. Vimala, "Optimization of OSPF LSA flooding process using clustering technique," in proceeding of the 2016 10th International Conference on Intelligent Systems and Control (ISCO), 2016. [8] B. Al-Musawi, P. Bransh, M. F. Hassan and S. R. Pokhrel, "dentifying OSPF LSA falsification attacks through non-linear analysis," Computer Networks, p.107031, Feb. 2020 . [9] B. Vetter, F. Wang and S. F. WU, " An experimental study of insider attacks for OSPF routing protocol," In Proceedings 1997 International Conference on Network Protocols, pp. 293-300. [10] D. S. Robbins, " Using Protocol Redundancy to Enhance OSPF Network System Survivability," in Southeast Conference, pp. 1-7, Apr. 2018. doi: 10.1109/SECON.2018.8479134. [11] D. Sangroha, and V. Gupta, " An Approach to Detect and Recover from OSPF Attacks. In Security in Computing and Communications," Second International Symposium, SSCC, Delhi, India, 2014. [12] G. Nakibly, A. Sosnovich, E. Menahem, A. Waizel, and Y. Elovici, "OSPF vulnerability to persistent poisoning attacks: a systematic analysis," In Proceedings of the 30th Annual Computer security applications Conference, pp. 336-345, 2014. doi:10.1145/2664243.2664278. [13] E. Kaffashi, A. Mousavi, H. Rahvard, S. H. Bojnordi, F. Khademsadegh, and S. Amirian, " A new attack on link-state database in open shortest path first routing protocol," Journal of Electrical and Electronic Engineering, pp.39-45, 2015. doi: 10.11648/j.jeee. s.2015030201.19. [14] Y. Song, S. Gao, A. Hu and B. Xiao, "Novel attacks in OSPF networks to poison routing table," IEEE International Conference on Communications (ICC), pp.1-6, 2017. doi: 10.1109/ICC.2017.7996829
  • 12. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 353 [15] N. Li, Y. Liu, and Z. Lu, " Research on Analysis and Detection Technology for Several Attacks of OSPF Vulnerability," International Conference on Transportation & Logistics, Information & Communication, Smart City, pp.299-303, 2018. doi: 10.2991/tlicsc-18.2018.48. [16]. C. Wen, Y. Liu S. Li, "A Routing Protocols Fuzzing Method based on MAN-IN-THE-MIDDLE," In 2022 2nd International Conference on Frontiers of Electronics, Information and Computation Technologies (ICFEICT), pp. 491-496, 2022. doi: 10.1109/ICFEICT57213.2022.00092. [17]. H. Sawalmeh, M. Malayshi, S. Ahmed, and A. Awad, "VPN Remote Access OSPF-based VPN Security Vulnerabilities and Counter Measurements," International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT), pp.236-241, Sep. 2021. doi:10.1109/3ICT53449.2021.9581512. [18] R. Meredith, and R. Dutta, "Increasing Network Resilience to Persistent OSPF Attacks," IEEE International Conference on Communications (ICC), pp. 1-7, May. 2019. doi:10.1109/ICC.2019.8761838.