Analiza bezbednosnih mehanizama OSPF protokola

12/03/2017
by   P. D. Bojovic, et al.
0

The security of the service and the system depends on the security of each of them components of this system. An attack on the routing protocol may be inaccurate functioning of the computer network. In some cases this is possible The attacker comes to data or artificial information for which he is not entitled. OSPF protocol is the most commonly used connection protocol. U In this paper, we conducted an OSPF security analysis and described it security mechanisms. ----- Bezbednost nekog servisa i sistema zavisi od bezbednosti svake komponente tog sistema. Napad na protokol rutiranja može proizvesti neispravno funkcionisanje računarske mreže. U pojedinim slučajevima moguće je da napadač doe do podataka ili umetne podatke za koje nema pravo. OSPF protokol je najrasprostranjeniji protokol stanja linka (link-state protocol). U ovom radu izvršili smo analizu bezbednosti OSPF protokola i opisali njegove bezbednosne mehanizme.

READ FULL TEXT
research
10/05/2020

Quality of Service-aware Security Framework for Mobile Ad hoc Networks using Optimized Link State Routing Protocol

All networks must provide an acceptable and desirable level of Quality o...
research
10/02/2019

Sensor Networks in Healthcare: Ensuring Confidentiality and User Anonymity in WBAN

Wireless body area network(WBAN) is becoming more popular in recent year...
research
06/30/2018

Charting the Security Landscape of Programmable Dataplanes

Emerging programmable dataplanes will revamp communication networks, all...
research
11/22/2022

The Security Protocol Verifier ProVerif and its Horn Clause Resolution Algorithm

ProVerif is a widely used security protocol verifier. Internally, ProVer...
research
05/25/2022

The security of the Coordicide: the implementation and analysis of possible attack vectors

The goal of the thesis is to study and perform an analysis of the possib...
research
09/20/2022

CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks

Current research in the automotive domain has proven the limitations of ...
research
03/03/2018

Security issues in a group key establishment protocol

Major shortcomings in a recently published group key establishment proto...

Please sign up or login with your details

Forgot password? Click here to reset