期刊文献+

基于攻击树的边界网关协议安全测试 被引量:2

Attack-Tree-Based Security Testing of BGP
下载PDF
导出
摘要 基于BGP协议构造的域间路由系统是因特网的基础设施。域间路由系统面临多种恶意攻击的威胁且易受人为错误的影响。本文提出BGP攻击树(Attack-Tree)模型,并应用该模型构造域间路由系统的安全性测试套件,不但能够全面地对BGP进行安全性测试,而且便于测试案例的生成和系统实现。测试过程就是对树的标记过程,本文为此提出了着色算法。利用生成的测试案例,对BGP目标系统进行安全测试实验。结果表明,这种方法能有效地发现BGP潜在的安全漏洞,为ISP运营商增强路由系统安全提供依据。 The inter-domain routing system based on BGP is the key routing infrastructure in the Internet. However, it is prone to imprudence errors and is menaced by many aggressive attacks. In this paper, we introduce an attack-tree model of BGP, and design a testing suite which can use the model to identify the vulnerability of the inter-domain routing system. The key part of the testing procedure is the process of marking attack-trees, and we present a coloring algorithm to solve it. The model can not only test the security of 13GP comprehensively, but also facilitate the generation of testing-cases and the implementation of systems. Using the generated testing-cases, we test the security of a target BGP system and the results indicate that this method can effectively expose the vulnerabilities of BGP, which helps ISP enhance routing systems.
出处 《计算机工程与科学》 CSCD 2006年第8期14-16,29,共4页 Computer Engineering & Science
基金 国家自然科学基金资助项目(90204005) 国家863计划资助项目(2005AA121570) 现代通信国家重点实验室基金资助项目(51436050605KG0102)
关键词 攻击树 边界网关协议(BGP) 域间路由系统 测试 attack tree border gateway protocol(BGP) inter-domain routing system test
  • 相关文献

参考文献10

  • 1Yakov Rekhter, Tony Li.A Border C-ateway Protocol 4(BGP-4)[R]. RFC 1771,1995.
  • 2Stephen A Misel . Wow, AS7007! NANOG Mail Archives[EB/OL]. http://www. merit. edu/mail. archives/ nanog/1997-04/msg00340. html, 1997-04.
  • 3J Cowie, A Ogielski, B Premore, et al. Global Routing Instabilities During Code Red Ⅱ and Nimda Worm Propagation[EB/OL]. http://www.renesys.com/projects/bgp_ instability, 2001-12.
  • 4Sandra Murphy. BGP Security Vulnerabilities Analysis[Z].draft-murphy-bgp-vuln-02.txt, 2002.
  • 5James Ng. Extensions to BGP to Support Secure Origin BGP(soBGP) [Z]. draft-ng-sobgp-bgp-extensions- 01. txt, 2003.
  • 6Esmerelda. Secure BGP Project (S-BGP) [EB/OL]. http://www. it. bbn. com/projects/s-bgp, 2005-03.
  • 7Bruce Sehneier. Attack Trees[EB/OL]. http://www.schneier.com/paper-attacktrees-ddj-ft.html, 1999-12.
  • 8Se.an Convery, David Cook,Matthew Franz.An Attack Tree for the Border Gateway Protocol [Z]. draft- convery-bgpat-tack-00.txt, 2003.
  • 9向尕,曹元大.基于攻击分类的攻击树生成算法研究[J].北京理工大学学报,2003,23(3):340-344. 被引量:8
  • 10Sam Halabi,Danny McPherson.Internet Routing Architec tures.Second Edition[M].北京:清华大学出版社,2000.

二级参考文献9

  • 1向尕 曹元大 周旭.基于攻击树的IDS攻击模式自动建立研究[Z]..中国科协首届博士生学术交流大会[C].深圳,2002..
  • 2Neumann P G, Parker D B. A summary of computer misuse techniques [Z]. The 12th National ComputerSecurity Conf. Baltimore, Maryland, 1989.
  • 3Carl E L, John P M. A taxonomy of computer program security flaws with examples [R].Washington: Naval Research Laboratory, 1993.
  • 4Frank A, Andrew H, Shlomo H, et al. Detecting malicious software by monitoring anomalous windows registry accesses[Z]. The Fifth International Symposium on Recent Advances in Intrusion Detection(RAID-2002), Zurich, Switzerland, 2002.
  • 5John D H. An analysis of security incident on the internet[J]. West Lafayette: Computer Department,Carnegie Mellon University, 1995.
  • 6Indqvist U L, Jonsson E. How to systematically classify computer security intrusions [Z]. IEEE Symposium on Security and Privacy, Oakland, 1997.
  • 7Sandeep K. Classification and detection of computer intrusions[D]. West Lafayette: Computer Department Purdue University, 1995.
  • 8Helmer G,Wong J,Slagell M,et a1.A software fault tree approach to requirements analysis of an intrusion detection system[Z]. Symposium on Requirements Engineering for Information Security,Indianapolis,2001.
  • 9王晓程,刘恩德,谢小权.攻击分类研究与分布式网络入侵检测系统[J].计算机研究与发展,2001,38(6):727-734. 被引量:75

共引文献7

同被引文献25

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部