Sciweavers

10 search results - page 1 / 2
» On the Vulnerabilities and Protection of OSPF Routing Protoc...
Sort
View
ICCCN
1998
IEEE
13 years 9 months ago
On the Vulnerabilities and Protection of OSPF Routing Protocol
This paper analyzes both the strong points and weak points of OSPF routing protocol from security perspective. On its strong points, we abstract its features of information least ...
Feiyi Wang, Shyhtsun Felix Wu
SIGCOMM
2010
ACM
13 years 5 months ago
Theory and new primitives for safely connecting routing protocol instances
Recent studies have shown that the current primitives for connecting multiple routing protocol instances (OSPF 1, OSPF 2, EIGRP 10, etc.) are pervasively deployed in enterprise ne...
Franck Le, Geoffrey G. Xie, Hui Zhang
GECCO
2007
Springer
268views Optimization» more  GECCO 2007»
13 years 11 months ago
Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols
Design, development and evaluation of adaptive, scalable, and power aware Bio/Nature inspired routing protocols has received a significant amount of attention in the recent past....
Nauman Mazhar, Muddassar Farooq
INFOCOM
2005
IEEE
13 years 10 months ago
Avoiding transient loops during IGP convergence in IP networks
— When the topology of an IP network changes due to a link failure or a link weight modification, the routing tables of all the routers must be updated. Each of those updates ma...
Pierre Francois, Olivier Bonaventure
NOMS
2006
IEEE
156views Communications» more  NOMS 2006»
13 years 10 months ago
An Integrated Solution to Protect Link State Routing against Faulty Intermediate Routers
— The importance of the routers in the network and the vulnerability in the nature of the link state routing protocol highlight the necessity of effective routing protection agai...
He Huang, Shyhtsun Felix Wu