期刊文献+

实现域间路由系统安全的系统化方法和有效工具 被引量:1

A Systematic Approach and Efficient Tools for Inter-Domain Routing System Security
下载PDF
导出
摘要 本文在全面分析域间路由安全威胁的基础上提出实现域间路由安全的系统化方法,从安全策略检测、路由协议增强、路由器健壮性设计、路由行为监测以及安全能力测试等多个角度来增强域间路由系统的安全能力,并建立域间路由系统的安全能力模型;探讨了各种安全功能的交互关系、多视图之间的互补与合作以及安全能力部署等问题;同时,给出了路由器安全配置检测工具、安全测试工具和路由监测系统的基本实现方案。 Based on the thorough analysis of secure threats of interdomain routing systems, the paper proposes a systematic approach to improving system security, which integrates policy checker, protocol enhancement, router robustness design, .behavior monitoring and security testing. The security capability model of inter-domain routing is built, and the relations between different security methods and their deployment are discussed. The designs of some efficient tools are also presented including configuration verifier, security tester and muting monitor.
出处 《计算机工程与科学》 CSCD 2006年第2期10-13,19,共5页 Computer Engineering & Science
基金 国家自然科学基金资助项目(90204005) 国家863计划资助项目(2003AA121510)
关键词 域间路由 安全 策略 协议增强 监测 能力模型 inter-domain routing security policy protocol enhancement monitoring capability model
  • 相关文献

参考文献7

  • 1J Cowie, A Ogielski, B Premore, et al. Global Routing Instabilities During Code Red II and Nimda Worm Propagation[EB/OL]. http://www. renesys.com /projeets/bgp_instability, 2003-03.
  • 2R Mahajan, D Watherall, T Addeson. Understanding BGP Misconfiguration[A]. ACM SIGCOMM'02[C]. 2002.
  • 3JUNOS Strict ISP Prefix Filter Template[EB/OL]. http://www. qorbit. net/doeuments/junos-bgp-template, pdf, 2003-03.
  • 4ftp://ftp-eng.cisco.com/cons/isp/security/Ingress-Prefix-Filter-Templates/, 2003-09.
  • 5http://www.cymru.com/Documents/bogon-list.html, 2003-09
  • 6Routeviews Project[EB/OL]. http://www.routeviews.org,2003-04,
  • 7L Gao. On Inferring Autonomous System Relationships in the Internet[Al. IEEE Global Intemet Symp[C]. 2000.

同被引文献11

  • 1朱培栋,刘欣,赵金晶.一种用于域间路由系统的监测模型[J].通信学报,2005,26(B01):76-80. 被引量:1
  • 2Rekhter Y,Li T.A border gateway protocol 4(BGP-4)[S],1995.
  • 3stewart J W.BGP-4:inter-domain routing in the internet[M].[S.l.]:Addison-Wesley,1998.
  • 4Sam H,McPherson D.Internet routing architectures[M].2nd ed.[S.l.]:Cisco Press,2001.
  • 5Estrin D,Postel J,Rekhter Y.Routing arbiter architecture[EB/OL].[1999].http://www.isi.edu/ra/Publications/.
  • 6Huston G.Interconnection,peering,and settlements[C]//Proc INET,1999-06.
  • 7Alaettinoglu C.Scalable router configuration for the Internet[C]//Proc IEEE IC3N,1996.
  • 8Subramanian L,Agarwal S,Rexford J,et al.Characterizing the Internet Hierarchy from Multiple Vantage Points.Sigcom 2002.
  • 9Horstmann C S,Cornell G.Core Java[M].5th ed.[S.l.]:[s.n],2005.
  • 10Route views project.http://www.routeviews.org.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部