Recovering an OSPF Network from Malicious Attacks: An Experimental Evaluation of Recovery Techniques

被引:0
|
作者
Meredith, Russell [1 ]
Landsberg, Natalie [1 ]
Lopez, Agueo [2 ]
Dutta, Rudra [1 ]
机构
[1] North Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
[2] North Carolina State Univ, Dept Elect & Comp Engn, Raleigh, NC USA
关键词
Resilience; Recovery; Security; Routing; OSPF; Attacks;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The routing infrastructure of the Internet is a high-value target for malicious actors. The Open Shortest Path First (OSPF) protocol is one of the most widely used protocols for Autonomous System (AS) internal routing, and has been the subject of attacks targeted at partitioning the network. Because of the widespread existing penetration of OSPF, research in defending against such attacks has focused toward prevention and detection techniques working in tandem with OSPF routers, rather than attempted modification of the protocol itself. However, comparatively few studies have attempted to address the topic of a network capable of recovery, which signifies a system that can be proof to an attack without the necessity for any specific attack to be explicitly detected, localized, or countered. In this paper, we first examine these existing recovery techniques, and come up with the underlying common mechanisms that they utilize. Then we examine the continued usefulness of these approaches with the more modern persistent OSPF attacks, by running actual attacks against an isolated network formed of typical commercial network elements, while allowing each such recovery mechanism to defend the network. Our experiments show that three of the five basic mechanisms can no longer defend against partitioning attacks when attacks are persistent, and provides relevant performance results for the other two. Our results also point the way to further improving these mechanisms for even more sophisticated attacks, in the future.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Recovering from malicious attacks in workflow systems
    Zhu, YJ
    Xin, T
    Ray, I
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2005, 3588 : 14 - 23
  • [2] Data damage assessment and recovery algorithm from malicious attacks in healthcare data sharing systems
    Ramzi A. Haraty
    Mirna Zbib
    Mehedi Masud
    Peer-to-Peer Networking and Applications, 2016, 9 : 812 - 823
  • [3] Data damage assessment and recovery algorithm from malicious attacks in healthcare data sharing systems
    Haraty, Ramzi A.
    Zbib, Mirna
    Masud, Mehedi
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2016, 9 (05) : 812 - 823
  • [4] From removal to recovery: An evaluation of nitrogen recovery techniques from wastewater
    Beckinghausen, Aubrey
    Odlare, Monica
    Thorin, Eva
    Schwede, Sebastian
    APPLIED ENERGY, 2020, 263
  • [5] Techniques for Securing 5G Network Services from attacks
    Varadharajan, Vijay
    Tupakula, Uday
    Karmakar, Kallol Krishna
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 273 - 280
  • [6] Performance evaluation of deep learning techniques for DoS attacks detection in wireless sensor network
    Salmi, Salim
    Oughdir, Lahcen
    JOURNAL OF BIG DATA, 2023, 10 (01)
  • [7] Performance evaluation of deep learning techniques for DoS attacks detection in wireless sensor network
    Salim Salmi
    Lahcen Oughdir
    Journal of Big Data, 10
  • [8] Experimental Evaluation of Recovery From Multiple Failures in Multicore Fiber-Based Optical Network
    Tanaka, Ken'ichi
    Lee, Yong
    Nomoto, Etsuko
    Sugawara, Toshiki
    Arimoto, Hideo
    IEEE PHOTONICS JOURNAL, 2016, 8 (03):
  • [9] Comparative Performance Evaluation Of Open Shortest Path First, OSPF And Routing Information Protocol, RIP In Network Link Failure and recovery cases
    Ajani, Ayodeji Akeem
    Ojuolape, Bilkisu Jimada
    Ahmed, Abdulkadir A.
    Aduragba, Tahir
    Balogun, Monsurat
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON ELECTRO-TECHNOLOGY FOR NATIONAL DEVELOPMENT (NIGERCON), 2017, : 280 - 288
  • [10] Modeling, Monitoring and Scheduling Techniques for Network Recovery from Massive Failures
    Tootaghaj, Diman Zad
    La Porta, Thomas
    He, Ting
    2019 IFIP/IEEE SYMPOSIUM ON INTEGRATED NETWORK AND SERVICE MANAGEMENT (IM), 2019, : 695 - 700