Resolving Vulnerability Of First Hop Redundancy Protocol Using Md5 Authentication

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - June Issue 2013 by IJCTT Journal
Volume-4 Issue-6                           
Year of Publication : 2013
Authors :Priyanka Dubey, Abha Sachdev

MLA

Priyanka Dubey, Abha Sachdev "Resolving Vulnerability Of First Hop Redundancy Protocol Using Md5 Authentication "International Journal of Computer Trends and Technology (IJCTT),V4(6):1567-1572 June Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract: - Security issues are major constraints in computer networks. According to CSA 90% of attacks are from inside the network. Earlier the issue was mainly with WAN networks but now the scenarios have changed. With development in technology, attacks are now more concentrated within a LAN. Our paper will mine the vulnerabilities in LAN technology and specifically point the problem regarding FIRST HOP REDUNDANCY. Also, here we present an effective reform to the aforesaid problem through MD5 algorithm based authentication, comparing it with previously suggested solutions. The only aim is to have a more secure communication without affecting the efficiency of the network.

 

References-
[1] T. Li Juniper Networks, B. Cole Juniper Networks, P. Morton Cisco Systems, D. Li Cisco Systems, RFC 2281 March 1998.
[2] R. Rivest MIT Laboratory for Computer Science and RSA Data Security, Inc. RFC 1321, April 1992
[3] DMZ virtualization with Vmware infrastructure.
[4] Eui -Gak Hwang,The DMZ and the Destiny of a Divided Korea, 2011, Springer, ISBN 978-1-4419-6435-9
[5] United States Patent. Patent Number: 5,473,599. Standby Router Protocol. Date of Patent: Dec. 5, 1995.
[6] John Sullivan, Network Fault Tolerance System, May 2000. IEEE conference
[7] Jarvinen, K. ; Tommiska, M. ; Skytta, J.Hardware Implementation Analysis of the MD5 Hash Algorithm, Jan. 2005, IEEE conference
[8] Shiwei Chen Chenhui Jin, An Improved Collision Attack on MD5 Algorithm, 2008, Springer. ISBN 978-3-540-79498-1
[9] S. Chang, M. Dworkin, Workshop Report, The First Cryptographic Hash Workshop, Report prepared, NIST 2005.
[10] Zhao Yong-Xia ; Zhen Ge, Md5 research, April 2010, IEEE conference.

Keywords —FHRP; HSRP; MD5; VRRP; DMZ.