期刊文献+

互联网路由威胁问题分析与监测系统设计 被引量:1

Research on the Security of Routing and Design of Detection System
原文传递
导出
摘要 路由系统是Internet的关键基础设施,路由系统的安全关系到核心网络安全。文中对路由系统的安全问题进行归类阐述,分析了历史上典型的安全事件,讨论了各种安全增强方案,提出有效、实用的路由安全监测系统设计方案,描述了系统结构、数据流图,实现了主要功能模块,给出了部署方案和试用效果。该系统能够基于路由表和路由报文对路由行为进行实时监测,发现异常路由和潜在的路由攻击。 Routing system is one of the most important infrastructures of the Internet. And the security of routing system contributes to the security of backbone network, This paper describes various threats on routing system, analyzes some typical security events, and evaluates some existing solutions, and at the same time, proposes an effective design for detection system knownas ISP-Healt. The system's architecture and functions , including its deployment are provided. This system can effectively monitor routing behaviors, and find abnormal routes or hidden routing attacks.
出处 《信息安全与通信保密》 2007年第8期178-181,共4页 Information Security and Communications Privacy
基金 国家自然科学基金(No.60673169) 国家高技术研究发展计划863项目(No.2006AA01Z213) 现代通信国家重点实验室基金(51436050605KG0102)
关键词 域间路由系统 态势可视化 安全监测 inter-domain routing situation visualization safety monitoring
  • 相关文献

参考文献11

  • 1[1]Barry Raveendran Greene,BGPv4 Security Risk Assessment[ DB/OL ].http://www.cisco.com/public/cons/isp/essentials/,Junell,2002.
  • 2[2]O.Nordstrom,Dovrolis C.Beware of BGP attacks SIGCOMM[J].Computer Communications Review,2004,34 (2):1~8.
  • 3[3]Underwood T.The anatomy of a leak:AS9121,NANOG,no.34,May 20-05.{A.C.Popescu,B.J.Premore,T.Underwood.The Anatomy of a Leak:AS9121.NANOG 34 (the 34th meeting of the North American Net work Operators' Group) May 15,2005.
  • 4[4]Karlin J.TTNet creates another large hijack..September 2006,http://cs.unm.edu/_karlinjf/IAR/phpBB2/viewtopic.php?t=14.
  • 5[5]"A fun hijack," June 2006,http://merit.edu/mail.archives/nanog/2006-06/msg00082.html.
  • 6[6]"AS 8437 announced a quarter of the net for half of an hour," August 2006,http://www.merit.edu/mail.archives/nanog/msg01700.html.
  • 7[7]Misel S A.Wow,AS7007! NANOG mail archives.http://www.merit.edu/mail.archives/nanog/1997-04/msg00340.html.
  • 8[8]Cowie J,Ogielski A,Premore B,et al.Global Routing Instabilities during Code Red Ⅱ and Nimda Worm Propagation.http://www.renesys.com/projects/bgp_instability.
  • 9[9]David Moore,Vern Paxson,Stefan Savage,Colleen Shannon,Stuart Staniford,Nicholas Weaver.The Spread of the Sapphire/Slammer Worm.http://www.caida.org/publications/papers/2003/sapphire/sapphire.html.
  • 10[10]Blackholed by Big Brother's Invisible Hand.http://www.dotcome on.com/invisible_hand.html.

同被引文献7

  • 1CLARK D D,PARTRIDGE C,RAMMING J C,et al.A Knowledge Plane for the Internet[C].[s.l.] :ACM SIGCOMM,2003.
  • 2GREENBERG A,HJALMTYSSON G,MALTZ D A,et al.Refactoring Network Control and Management:A Case for the 4D Architecture[R].Pittsburgh,Carnegie Mellon University,2005.
  • 3GREENBERG A,HJALMTYSSON G,MALTZ D A,et al.A Clean Slate 4D Approach to Network Control and Management[J].ACM Computer Communication Review,2005(05):41-54.
  • 4REXFORD J,GREENBERG A,HJALMTYSSON G,et al.Network-Wide Decision Making:Toward a Wafer-Thin Control Plane[C] //Proc.ACM HotNets Workshop.San Diego,CA USA:[s.n.] ,2004.
  • 5YANH,MALTZ D A,EUGENE Ng T S,et al.Tesseract:A 4D Network Control Plane[C] //Proc.USENIX NSDI'07.Cambridge,MA USA:[s.n.] ,2007.
  • 6THOMAS R.Cognitive Networks[D].Virginia:Virginia Polytechnic Institute & State Univ.,2007.
  • 7鞠宏军,时光,王成耀.对下一代Internet网络体系结构的思考[J].通信技术,2008,41(3):76-78. 被引量:3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部