An Toàn L P 3 - Routing Attacks: Nguyen Hong Son Ptithcm
An Toàn L P 3 - Routing Attacks: Nguyen Hong Son Ptithcm
An Toàn L P 3 - Routing Attacks: Nguyen Hong Son Ptithcm
Overview
• Router
• Routing
• Forwarding
• RoutingTable
• Routing algorithms
• Routing protocols
• Routed protocols
3
optimal path.
Routing attacks
• Two sources of incorrect routing information – by internal and external
attacks :
• External attacks, also called link attacks
• Internal attacks, also called router attacks
6
routers.
• The best way is to listen to routers’ signaling. Any host computer which
shares the same broadcast domain with the routers or knows the
corresponding multicast address (see below), is able to obtain the routing
protocol messages.
7
update messages
legitimate
Internal Attacks
• Incorrect routing information is sent from a router. There are
different kinds of router attack:
• Masquerading routers: forges the identity of an authorized router, a
result of the IP spoofing or source routing attacks.
• Subverted routers: An authorized router is caused to disobey the
routing protocols, or forced to claim incorrect system parameter, by
ways: making use of the bugs in the router operating system,
miconfiguring the system files, or causing a router to load malicious
software
• Unauthorized routers: A router is not authorized but manages to join
the routing network and participate in the routing protocol
exchange dialog. It can occur if the access control mechanisms are
not well designed or configured
11
configured to perform.
• HTC-Hydra (http://freeworld.thc.org/thc-hydra)
Internet
RIP Attacks
• A malicious router advertising routing update messages
PAIR: Operations
1. Tree Construction
2. Metrics Calculation
3. Detection Procedure
4. Recovery Procedure
22
Tree Construction
23
Metrics Calculation
24
Detection Procedure
25
Recovery Procedure
Refer to:
OSPF Attacks
• Open Shortest Path First (OSPF) is the most popular link state
protocol
• The operations of OSPF consist of three phases:
BGP Attacks
• Primary Vulnerabilities
• Attack Objectives
• Black Hole
• Traffic Redirection
• Traffic Subversion
• Instability
• Attack Mechanisms
• Prefix Hijacking
• Prefix De-aggregation
• Contradictory Advertisements
• Exploitation of route damping
29