期刊文献+

防范前缀劫持的互联网注册机制 被引量:3

Internet Registry Mechanism for Preventing Prefix Hijacks
下载PDF
导出
摘要 借鉴IRR(Internet routing registry)机制中注册路由策略的思想,提出了前缀策略(prefix policy)的概念,并由此设计了一种防范前缀劫持的方法——E-IRR机制.在E-IRR中,参与者发布自己的前缀策略,同时利用其他自治系统已注册的前缀策略验证BGP路由,从而防范前缀劫持.提出了维护前缀策略有效性措施,评估了E-IRR机制的安全能力与性能.方法的主要优势是,其在前缀劫持的防范能力与安全机制的实际部署需求之间达到了一个较好平衡,可增量式地部署,并不需要对BGP协议进行任何安全扩展.现有方案都不同时具备这些特性,它们使得E-IRR有望实际可行地解决前缀劫持问题. Based on the registering idea of IRR (internet routing registry), the concept of Prefix Policy is proposed, and a new Internet registry mechanism, E-IRR, is presented. E-IRR offers an efficient and defensive method to prevent hijacked routes. In E-IRR, every participant declares its prefix policies, and makes use of the others' registered prefix policies to validate BGP routes. Measures are designed to guarantee the validity of prefix policies, and evaluate its capabilities of security and performance. The major benefits of the method are the balance it reaches between the capability of preventing prefix hijacks and the security mechanism's requirements of practical deployment, the facts that the method lends itself to stepwise deployment and needs not any BGP extension for security. These properties, not shared by alternative approaches, make it an attractive and viable solution to the prefix hijacking problem.
出处 《软件学报》 EI CSCD 北大核心 2009年第3期620-629,共10页 Journal of Software
基金 国家高技术研究发展计划(863) 国家自然科学基金 国防科学技术大学博士研究生创新基金~~
关键词 边界网关协议 域间路由系统 前缀劫持 前缀策略 互联网路由注册处 互联网注册机制 BGP inter-domain routing system prefix hijacking prefix policy IRR internet registry mechanism
  • 相关文献

参考文献2

二级参考文献10

  • 1Halabi B.Internet Routing Architectures[M].Indianopolis:Cisco Press,Second Edition,2001.
  • 2Kent S,Lynn C,Seo K.Secure Border Gateway Protocol (Secure-BGP)[J].IEEE Journal on Selected Areas in Communications,2000,18(4):582-592.
  • 3Murphy S.Border Gateway Protocol Security Analysis[EB/OL].IETF Internet Draft,draft-murphy-bgp-vuln-00.txt.Nov.2001.
  • 4Cowie J,Ogielski A,Premore B,et al.Global Routing Instabilities During Code Red Ⅱ and Nimda Worm Propagation[EB/OL].http://www.renesys.com/projects/bgpinstability.
  • 5Misel S A.Wow,AS7007! NANOG Mail Archives[EB/OL].http://www.merit.edu/mail.archives/nanog/1997-04/msg00340.html.
  • 6Mahajan R,et al.Understanding BGP Misconfiguration[A].ACM SIGCOMM' 2002[C],2002.
  • 7Gao L.On Inferring Autonomous System Relationships in the Internet[A].In IEEE Global Internet Symposium[C],2000.
  • 8Subramanian L,Agarwal S,Katz R H.Characterizing the Internet Hierarchy from Multiple Vantage Points[A].INFOCOM 2002[C],2002.
  • 9Broido A,Nemeth E,Claffy K.Internet Expansion,Refinement and Churn[A].ETT Janu 2002[C],2002.
  • 10Mahajan R,Wetherall D,Anderson T.Understanding BGP Misconfiguration[A].In ACM SIGCOMM[C],2002.

共引文献8

同被引文献14

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部