Analysis, Evaluation, Security Challenges and Improvements of OSPFv2 Routing Protocol and OSPF's IPv6 Version, OSPFv3 - 23

Introduction, OSPF Overview, Routing Hierarchy in OSPF, Basic Implementation Requirements, LSA's, Dijkstra Algorithm, Security Strengths in OSPF, Security Weak Points in OSPF, External Threats, Internal Threats, Basic OSPF Vulnerabilities, Damages that Can Caused by a Possible Attack on the Network, Types of Attacks in OSPF Protocol, The Ji Nao Team Attacks, Other Attacks against the OSPF Fight Back Mechanism, Two New Attacks on the OSPF Protocol, Remote False Adjacency Attack, Disguised LSA, OSPFv3, OSPFv3 Introduction, OSPFv3 Differences from OSPFv2, LSA Types for OSPFv3, Authentication and Confidentiality for OSPFv3, OSPFv3 Security Association, Management and Technical Issues with OSPFv3, OSPF Topology Authentication Lab Test, Conclusion, References.