A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
OSPF vulnerability to persistent poisoning attacks
2014
Proceedings of the 30th Annual Computer Security Applications Conference on - ACSAC '14
Open Shortest Path First (OSPF) is one of the most widely deployed interior gateway routing protocols on the Internet. The most common attack vector against OSPF is spoofing of routing advertisements on behalf of a remote router. OSPF employs a self-defense "fight-back" mechanism that quickly reverts the effects of such attacks. Nonetheless, some attacks that evade the fight-back mechanism have been discovered, making it possible to persistently falsify routing advertisements. This type of
doi:10.1145/2664243.2664278
dblp:conf/acsac/NakiblySMWE14
fatcat:mo4e4fpcxjeatnp7nokajijx7y