Detecting and mitigating security vulnerabilities in dynamic routing protocols: current challenges and solutions.
Abstract
In the modern world, where digital infrastructure is becoming increasingly complex and interconnected, dynamic routing plays a key role in maintaining the efficiency and flexibility of network systems. The purpose of the article is to determine the current state of security vulnerabilities in dynamic routing protocols used in network systems and to propose a comprehensive risk mitigation strategy using artificial intelligence capabilities. The article discusses various dynamic routing protocols, such as OSPF, IS-IS, BGP, and EIGRP, their features and applications depending on specific needs and requirements for the network environment. Particular attention is paid to the choice between these protocols, taking into account factors such as scalability, management flexibility, and the availability of specific equipment. It is emphasized that the security of dynamic routing remains vulnerable to various threats due to shortcomings in authentication, scaling, load balancing, and the possibility of falsifying routing information. The importance of an integrated approach to security is emphasized, including the use of modern authentication methods, software updates, network monitoring, and encryption. The role of artificial intelligence in identifying and mitigating threats is highlighted, which opens up new prospects for improving the security of network infrastructures. The need for continuous development and investment in cybersecurity, as well as the need for sustained attention to security at the level of routing protocols to effectively counter cyber threats, is emphasized. The proposed research can be useful for professional researchers, analysts, and businesses. Further research will focus on a detailed analysis of the impact of artificial intelligence on the detection and mitigation of security vulnerabilities in dynamic routing protocols.
References
2. Chen I., Bao F., Chang M., Cho J. Dynamic trust management for delay tolerant networks and its application to secure routing. IEEE Transactions on Parallel and Distributed Systems. 2014. №25(5). Р. 1200–1210.
3. Korir F., Cheruiyot W. A survey on security challenges in the current MANET routing protocols. Global Journal of Engineering and Technology Advances. 2022. №12(1). Р. 78–91.
4. Mohanapriya M., Krishnamurthi I. Trust based DSR routing protocol for mitigating cooperative black hole attacks in ad hoc networks. Arabian Journal for Science and Engineering. 2013. №39(3). Р. 1825–1833.
5. Alnumay W., Ghosh U. Secure routing and data transmission in mobile ad hoc networks. International Journal of Computer Networks and Communications. 2014. №6(1). Р. 111–127.
Abstract views: 39 PDF Downloads: 46