[1] |
HARTMAN S , ZHANG D . Analysis of OSPF Security According to KARP Design Guide[S]. 2011.
|
[2] |
JAVVIN . TCP/IP network vulnerability and security[EB/OL]. .
|
[3] |
JONES E , MOIGNE O . OSPF Security Vulnerabilities Analysis[S]. 2006.
|
[4] |
BARBIR A , MURPHY S , YANG Y . Threats to Routing Protocols[S]. RFC 4593, 2006.
|
[5] |
MOY J . OSPF Version 2[S]. 1998.
|
[6] |
陈海燕, 季仲梅, 李鸥等 . OSPF 路由协议安全性分析及其攻击检测[J]. 微计算机信息, 2005,5: 234-235. CHEN H Y , JI Z M , LI O ,et al. OSPF routing protocol security analysis and attacks detection[J]. Microcomputer Information, 2005,5: 234-235.
|
[7] |
蔡朝权 . OSPF 路由协议的攻击分析与安全防范[J]. 计算机工程与技术, 2007,28(23): 5618-5620. CAI Z Q . OSPF routing protocol attacks analysis and security precaution[J]. Computer Engineering, 2007,28(23): 5618-5620.
|
[8] |
高峥, 李林涛 . OSPF 协议安全性分析[J]. 黑龙江科技信息, 2011,11:78. GAO Z , LI L T . OSPF protocol security analysis[J]. Heilongjiang Science and Technology Information, 2011,11:78.
|
[9] |
VETTER B , WANG F , WU S.F . An experimental study of insider attacks for OSPF routing protocol[A]. IEEE 1997 International Conference on Network Protocols[C]. Atlanta,Georgia,USA, 1997. 293-300.
|