skip to main content
10.1145/2523514.2523532acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

Verification of OSPF vulnerabilities by colored Petri net

Published:26 November 2013Publication History

ABSTRACT

Routers and routing protocols are critical parts of a network infrastructure. OSPF is one of the most important routing protocols, and therefore its vulnerabilities can be very destructive. This makes its security analysis critical. There are many reported and potential vulnerabilities in OSPF protocol. Considering the complexity and the ambiguity of its description in RFC 2328, it is very valuable to design a formal model of the protocol and analyze the vulnerabilities of its critical parts. In this paper, some challenging parts of OSPF protocol along with attack scenarios are modeled by means of Colored Petri Net in CPN Tools environment. Then, the reported vulnerabilities are analyzed by a behavioral property of Petri net, and the existence of the vulnerabilities is verified by the property checking. Moreover, a new potential vulnerability is presented and verified by both formal and experimental methods.

References

  1. J. Moy. OSPF Version 2. RFC 2328 (INTERNET STANDARD), Apr 1998.Google ScholarGoogle Scholar
  2. W. Feiyi and W. Felix. On the Vulnerabilities and Protection of OSPF Routing Protocol. In Proceedings of 7th International Conference on Computer Communications and Networks, pages 148--152, Louisiana, USA, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. F. Wang. Vulnerability Analysis, Intrusion Prevention and Detection for Link State Routing Protocols. PhD thesis, North Carolina State University, Raleigh, NC, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. Tadao. Petri nets: Properties, Analysis and Applications. Proceedings of the IEEE, 77(4): 541--580, 1989.Google ScholarGoogle Scholar
  5. K. Jensen and L. M. Kristensen. Coloured Petri Nets - Modelling and Validation of Concurrent Systems. Springer, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. CPN Tools Home Page. http://www.cpntools.org/.Google ScholarGoogle Scholar
  7. J. Kurt, K. Lars Michael, and W. Lisa. Coloured Petri Nets and CPN Tools for modelling and validation of concurrent systems. International Journal on Software Tools for Technology Transfer, 9(3--4): 213--254, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. K. Ishiguro. Quagga, a Routing Software Package for TCP/IP Networks. Technical report, Quagga Development Team, http://www.nongnu.org/quagga/, 2012.Google ScholarGoogle Scholar
  9. P. Biondi. Scapy: Explore the Net with New Eyes. Technical report, EADS Corporate Research Center, http://www.secdev.org, 2005.Google ScholarGoogle Scholar
  10. D. Obradovic. Formal Analysis of Routing Protocols. PhD thesis, University of Pennsylvania, Pennsylvania USA, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. M. Saif Ur Rehman, S. Sudarshan K, K. Samee U, and W. Lizhe. A Methodology for OSPF Routing Protocol Verification. In 12th International Conference on Scalable Computing and Communications (ScalCom), China, 2012.Google ScholarGoogle Scholar
  12. A. Salah and K. Mustafa. Protocol Verification and Analysis using Colored Petri Nets. Technical report, DePaul University, Chicago USA, 2004.Google ScholarGoogle Scholar
  13. V. Brain, W. Feiyi, and W. S. Felix. An Experimental Study of Insider Attacks for OSPF Routing Protocol. In Proceedings of International Conference on Network Protocols, pages 293--300, Atlanta, USA, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. G. Nakibly, A. Kirshon, D. Gonikman, and D. Boneh. Persistent OSPF Attacks. In Proceedings of the 19th Annual Network and Distributed System Security Symposium, San Diego, California, Feb 2012.Google ScholarGoogle Scholar
  15. S. Murphy, M. Badger, and B. Wellington. OSPF with Digital Signatures. RFC 2154, Jun 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Verification of OSPF vulnerabilities by colored Petri net

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            SIN '13: Proceedings of the 6th International Conference on Security of Information and Networks
            November 2013
            483 pages
            ISBN:9781450324984
            DOI:10.1145/2523514

            Copyright © 2013 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 26 November 2013

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            Overall Acceptance Rate102of289submissions,35%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader