An experimental study of insider attacks for OSPF routing protocol

  • Authors:
  • B. Vetter;F. Wang;S. F. Wu

  • Affiliations:
  • -;-;-

  • Venue:
  • ICNP '97 Proceedings of the 1997 International Conference on Network Protocols (ICNP '97)
  • Year:
  • 1997

Quantified Score

Hi-index 0.01

Visualization

Abstract

It is critical to protect the network infrastructure (e.g., network routing and management protocols) against security intrusions, yet dealing with insider attacks are probably one of the most challenging research problems in network security. We study the security threats, especially internal/insider threats, for the standardized routing protocol OSPF. In OSPF, a group of routers collaborate, exchange routing information, and forward packets for each other. If one (and maybe more than one) router is evil or compromised, how can this router damage the whole network? In this paper, we analyze OSPF and identify its strengths and weakness under various insider attacks. Furthermore, to confirm our analysis, we have implemented and experimented one attack, the max sequence number attack, on our OSPF routing testbed. Our attack is very successful against two independently developed router products as it will block routing updates for 60 minutes by simply injecting one bad OSPF protocol data unit.