期刊文献+

边界网关协议的攻击分析与安全防范 被引量:2

Attacks Analysis and Security Precaution of Border Gateway Protocol
下载PDF
导出
摘要 分析边界网关协议(BGP)当前版本中存在的漏洞和脆弱性,指出可能遭受的基于TCP及自身漏洞的攻击。提出BGP的安全威胁模型和防范策略,以及如何对协议功能进行扩展的措施。以CISCO路由器为例,给出典型的安全防范配置。实践证明,通过访问控制列表、数字签名、路由过滤、源地址检测和协议扩展方案,可以有效提高网络的安全性和稳定性。 By analyzing the loopholes and weakness in the current version of Border Gateway Protocol(BGP) and noting the potential attacks based on TCE this paper gives the BGP security threat model and the corresponding preventive strategy, and explains how to extend the functions of the protocol. As an example, a typical security precaution setup of the CISCO routing is illustrated. Practice proves that, network security and stability can be effectively improved through access control lists, digital signature, routing filtering, source address detection and protocol extended function.
作者 蔡昭权
出处 《计算机工程》 CAS CSCD 北大核心 2008年第5期145-147,共3页 Computer Engineering
基金 惠州市科技计划基金资助项目(2006P42) 惠州学院科研基金资助项目(C_206.0205)
关键词 路由协议 漏洞 攻击 防范 安全 边界网关协议 routing protocol loopholes attack precaution security Border Gateway Protocol(BGP)
  • 相关文献

参考文献4

二级参考文献24

  • 1[1]Kent S. Comments on 'security problems in the TCP/IP protocol suite'[J]. ACM Computer Commun Review, 1989,19(3):10-19.
  • 2[2]Murphy S L. Presentation in panel on 'security architecture for the internet infrastructure'[J].Symposium on Network and Distributed System Security,1995. 
  • 3Convery S, Cook D, Franz M. An attack tree for the border gateway protocol[ Z]. IETF Draft. 2003.
  • 4CIDR. Cidr report[EB/OL]. http:∥www. cidr - report.org/. 2005.01 - 24.
  • 5Barbir A, Murphy S, Yang Y. Generic threats to routing protocols[Z]. IETF Draft. 2003.
  • 6Sandra B. BGP Security Vulnerabilities Analysisdaft - murphy -bgp-vuln-02. txt[Z]. IETF Draft. 2003.
  • 7Bonaventure O. Interdomain routing with bgp: Issues and challenges[Z]. Louvain - la - Neuve, Belgium: IEEE SCVT,2002.20 - 22.
  • 8Kaufman C. Internet Key Exchange (IKEv2) Protocol[Z]. IETF, draft- ieff- ipsec- ikev2 - 10. txt. 2003.
  • 9Aiello W, Ioannidis J. Origin authentication in interdomain routing[ M]. Washington, DC: ACMCCS, 2003.
  • 10Bates T,Bush R,Li T,et al.Dns- based NLRI origin as verification in bgp[Z]. IETF Draft. 1998.

共引文献3

同被引文献13

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部