OK? Title is wrong. How about make fun of someone? Have a ball, bump?
Intro: This paper will present a fictitious scenario wherein a router is duped into believing an imposter is a router that is already known and trusted. As a result, his routing tables are overwritten and traffic gets re-routed. This paper is written from the point of view of an overworked, stressed out, grumpy router with an attitude. Throughout the paper, the router will highlight various packets it receives, and explain how he processes them. As the story progresses, sporadic nefarious incidents will be seen by the router. They could be seen as hints about what is about to happen. Unfortunately, the router is not a firewall, so his depth of view is limited, and certain security practices are not being used. At the conclusion of the paper, the author will recommend a security option that should make router impersonation more difficult, thereby providing an additional layer of protection |