Publication:
OSV: OSPF vulnerability checking tool

dc.contributor.authorPoonyavee Kasemsuwanen_US
dc.contributor.authorVasaka Visoottivisethen_US
dc.contributor.otherMahidol Universityen_US
dc.date.accessioned2018-12-21T07:18:56Z
dc.date.accessioned2019-03-14T08:03:22Z
dc.date.available2018-12-21T07:18:56Z
dc.date.available2019-03-14T08:03:22Z
dc.date.issued2017-09-05en_US
dc.description.abstract© 2017 IEEE. OSPF is one of a widely deployed intra-domain routing protocol in enterprise network operation around the world. As the protocol itself was introduced about two decades ago, it contains many known attacks which some of them can be patched by a newer version of the router firmware. Nevertheless, a reckless or a poor practice of network operator could jeopardize the system by forgetting to enable the OSPF authentication or use a password that can be easily guessed. Moreover, a lot of routers that still in operating out there are running with the out-of-date firmware, which surely contains security holes. Attacks on routing protocol could lead to severe damage to the network. In this paper, we introduce OSV as a tool to detect the OSPF network vulnerability by checking password strength and performing ten penetration testing against the target OSPF network. OSV also generates a report to inform any vulnerability found to help the network operator detect their security issues. We confirm the validation and the performance of OSV tool by testing it with Quagga and Cisco routers.en_US
dc.identifier.citationProceedings of the 2017 14th International Joint Conference on Computer Science and Software Engineering, JCSSE 2017. (2017)en_US
dc.identifier.doi10.1109/JCSSE.2017.8025919en_US
dc.identifier.other2-s2.0-85031734762en_US
dc.identifier.urihttps://repository.li.mahidol.ac.th/handle/20.500.14594/42320
dc.rightsMahidol Universityen_US
dc.rights.holderSCOPUSen_US
dc.source.urihttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85031734762&origin=inwarden_US
dc.subjectComputer Scienceen_US
dc.titleOSV: OSPF vulnerability checking toolen_US
dc.typeConference Paperen_US
dspace.entity.typePublication
mu.datasource.scopushttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85031734762&origin=inwarden_US

Files

Collections