Table of Contents
OSPF: Vulnerability Analysis and Intrusion Detection
Outline:
Publications
Vulnerability Analysis
PPT Slide
Three Phases of OSPF
Five OSPF/LSA Attacks
PPT Slide
PPT Slide
Undetected Tampering
Fresher LSA?
JiNao Design:Block Diagram
An JFSM for Seq++
PPT Slide
PPT Slide
PPT Slide
ID through INM
ID through INMS: Examples
ID through INMS : Architecture and Prototyping
Attack Space
OSPF/RFC Specification
OSPF/Implementation
|
Author: Daniel
|