Practical Analysis and Simulation of OSPF Protocol Vulnerabilities: A practical exploration of documented vulnerabilities associated with OSPFv2
2024 (English)Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE credits
Student thesisAlternative title
Praktisk Analys och Simulering av Sårbarheter i OSPF-protokollet : En granskning av kända sårbarheter relaterade till OSPF-protokollet i en praktisk, simulerad miljö. (Swedish)
Abstract [en]
Todays rapid advancements and developments within the field of IT bring both challenges and vulnerabilities. The growing digital presence results in heightened risks associated with sabotage and unauthorized access. Addressing these threats necessitates a continuous assessment of the potential vulnerabilities within the IT landscape. Open Shortest Path First (OSPF) is a router protocol utilized to determine the optimal routes for transmitting data packets from a source to their destination across a computer network. Given OSPF’s broad application, the potential for attacks becomes more conceivable. Router adjacencies and links form a fundamental part of the protocol, and in this study, we explore the potential to introduce malicious information along with examining its persistence. We simulate two different attacks in Core Network Emulator called remote false adjacency and disguised LSA. Through these two attacks, we successfully introduced both false adjacencies and malicious links across several different network topologies.
Abstract [sv]
I takt med teknologins framsteg och den ökande tillgängligheten av internetbaserade tjänster ökar även riskerna för sabotagemöjligheter inom dessa områden. Dessa risker sätter press på säkerheten för att skydda dessa tjänster, och regelbundna utvärderingar krävs för att snabbt identifiera och åtgärda eventuella brister och sårbarheter. I denna uppsats simulerar vi kända sårbarheter hos routingprotokollet OSPF, som ofta används av routrar för att bestämma optimala vägar inom stora datornätverk. Via attackerna remote false adjacency och disguised LSA lyckades vi få routrar i olika nätverkstopologier att lita på routrar som inte existerar, samtidigt som vi också skapade falska länkar.
Place, publisher, year, edition, pages
2024. , p. 42
Series
TRITA-EECS-EX ; 2024:754
Keywords [en]
OSPF, Open Shortest Path First, OSPF vulnerabilities, Remote false adjacency, Disguised LSA, Network security, Cyber security.
Keywords [sv]
OSPF, Open Shortest Path First, OSPF sårbarheter, Remote false adjacency, Disguised LSA, Nätverkssäkerhet, Cybersäkerhet.
National Category
Computer and Information Sciences
Identifiers
URN: urn:nbn:se:kth:diva-360138OAI: oai:DiVA.org:kth-360138DiVA, id: diva2:1938518
Supervisors
Examiners
2025-02-202025-02-182025-02-20Bibliographically approved