routers have powerful forwarding capabilities but limited control and management capabilities. In a denial of service (DoS) attack, attackers initiate mass request messages to a router. As a result, the CPU of the router fails to process messages in real time, and normal service flows and internal processing flows are interrupted. Consequently, services are denied.
DoS attacks constitute the greatest threat to routers and must be considered in security hardening.
Information disclosure results from unauthorized access. Possible causes of unauthorized access are as follows:
Due to the openness of IP networks, packets may be maliciously tampered with by transit nodes or modified by middlemen on purpose to initiate attacks during transmission.
Software and patches may be tampered with before being uploaded to a device. If the device runs software or a patch that has been tampered with, it will be controlled maliciously and attacked.
Unauthorized access enables users to obtain the control right or higher right over a router. Possible causes of unauthorized access are as follows:
Due to the openness, the IP network has no authentication and authorization mechanism for MAC and IP addresses, which may easily cause ARP-/IP-based address spoofing attacks. As a result, the router needs to continuously refresh address entries required for the forwarding process and process requests from spoofed addresses. Incorrect address entries may interrupt the forwarding, and insufficient entry learning capabilities may cause DoS attacks.
Due to the openness, the IP network cannot authenticate the communication terminals at Layer 3 or lower layers. Taking advantage of this defect, hackers send the specified packets repeatedly to initiate DoS attacks.
In the network system, a router functions not only as a forwarding node but also as a network unit that can be managed. When computers on the same network segment are infected with viruses, a large amount of spam traffic is generated and exhausts network bandwidth. In this case, the router cannot obtain network resources as a network element (NE), and therefore services are unavailable.
Policies that are configured specially for network construction are not cleared in a timely manner after service provisioning.
During network reconstruction, configurations are incorrect due to carelessness or skill shortage of engineers. For example, a loop exists because a network cable is incorrectly plugged, services are interrupted due to incorrect protocol configurations, unexpected blocking of traffic occurs due to configuration errors in the access control policy, and unnecessary access channels are activated.
Administrators share accounts and passwords with other persons.
In general, routers do not have strict restrictions on access of physical devices. High priority permissions can be obtained through physical connections. Malicious attackers access the router after intruding protection facilities, such as door status control and monitoring system.