Analysis, Evaluation, Security Challenges and Improvements of OSPFv2 Routing Protocol and OSPF's IPv6 Version, OSPFv3
Material type:
TextDescription: 23Summary: Introduction, OSPF Overview, Routing Hierarchy in OSPF, Basic Implementation Requirements, LSA's, Dijkstra Algorithm, Security Strengths in OSPF, Security Weak Points in OSPF, External Threats, Internal Threats, Basic OSPF Vulnerabilities, Damages that Can Caused by a Possible Attack on the Network, Types of Attacks in OSPF Protocol, The Ji Nao Team Attacks, Other Attacks against the OSPF Fight Back Mechanism, Two New Attacks on the OSPF Protocol, Remote False Adjacency Attack, Disguised LSA, OSPFv3, OSPFv3 Introduction, OSPFv3 Differences from OSPFv2, LSA Types for OSPFv3, Authentication and Confidentiality for OSPFv3, OSPFv3 Security Association, Management and Technical Issues with OSPFv3, OSPF Topology Authentication Lab Test, Conclusion, References.
| Item type | Current library | Call number | Copy number | Status | Barcode | |
|---|---|---|---|---|---|---|
Διπλωματική εργασία
|
MC Athens Campus Library | COMP 2016 (8) (Browse shelf(Opens below)) | 1 | Available | 9780000087089 |
Browsing MC Athens Campus Library shelves Close shelf browser (Hides shelf browser)
Introduction, OSPF Overview, Routing Hierarchy in OSPF, Basic Implementation Requirements, LSA's, Dijkstra Algorithm, Security Strengths in OSPF, Security Weak Points in OSPF, External Threats, Internal Threats, Basic OSPF Vulnerabilities, Damages that Can Caused by a Possible Attack on the Network, Types of Attacks in OSPF Protocol, The Ji Nao Team Attacks, Other Attacks against the OSPF Fight Back Mechanism, Two New Attacks on the OSPF Protocol, Remote False Adjacency Attack, Disguised LSA, OSPFv3, OSPFv3 Introduction, OSPFv3 Differences from OSPFv2, LSA Types for OSPFv3, Authentication and Confidentiality for OSPFv3, OSPFv3 Security Association, Management and Technical Issues with OSPFv3, OSPF Topology Authentication Lab Test, Conclusion, References.
There are no comments on this title.