期刊文献+

一种防范BGP地址前缀劫持的源认证方案 被引量:4

Origin Authentication Scheme Against BGP Address Prefix Hijacking
下载PDF
导出
摘要 提出了一种基于线索平衡二叉排序哈希树认证委分字典的安全高效的源认证(origin authentication,简称OA)方案,用于防范BGP地址前缀劫持攻击.基于Aiello和McDaniel等人提出的OA服务,通过数值区间对AS号和IP地址前缀这两种BGP前缀宣告资源进行了统一的形式化定义,采用一种方案同时解决了两种前缀宣告资源的源可信问题.该方案不仅解决了原OA服务中存在的"无效分配关系的证据量是有效分配关系证据量的两倍"的问题,而且与原OA服务相比,该方案建树所需要的总节点数降低约一半.同时,委分证据集合的平均长度更小.因此,该源认证方案效率更高. A new origin authentication scheme based on a threaded balanced binary stored hash tree for authenticated delegation/assignment dictionaries is proposed to solve the problems of BGP (border gateway protocol) address prefix hijacking. BGP address prefix announcement is made up of AS number and IP address prefix, and this paper makes use of the number value range to uniformly define two kinds of BGP address prefix announcement resources, so the two kinds of BGP address prefix announcement resources' origin trustworthy problems are issued by one efficient origin authentication scheme in this paper. This scheme inherits the merit of a threaded binary stored hash tree to correct the shortcomings existing in the William Aiello and Patrick McDaniel's origin authentication scheme that the amount of the evidence for invalid delegation/assignment is double that of the valid. Meanwhile, in contrast with original OA scheme, this scheme reduces the number of tree nodes to half the amount of the delegation/assignment attestation set. which is smaller, so this scheme is more efficient.
出处 《软件学报》 EI CSCD 北大核心 2012年第7期1908-1923,共16页 Journal of Software
基金 国家自然科学基金(61003285) 国家重点基础研究发展计划(973)(2007CB310704) 教育部科学技术研究重点项目
关键词 源认证 前缀劫持 BGP(border GATEWAY protocol) AS号 IP地址前缀 origin authentication prefix hijacking BGP (border gateway protocol) AS number IP address prefix
  • 相关文献

参考文献3

二级参考文献28

  • 1刘欣,朱培栋,米强,杨明军.基于规则的域间路由系统异常检测[J].国防科技大学学报,2006,28(3):71-76. 被引量:4
  • 2张宏科,苏伟.新网络体系基础研究——一体化网络与普适服务[J].电子学报,2007,35(4):593-598. 被引量:126
  • 3Rekhter Y, Li T, Hares S. A Border Gateway Protocol 4 (BGP - 4)[S] .IETF RFC4271,2006.
  • 4Murphy S. BGP security vulnerabilities analysis [ S ]. IETF RFC4272,2006.
  • 5Nordstrom O, Dovrolis C. Beware of BGP Attack [ J ]. ACM Computer Communications Review,2004,34(2) : 1 - 8.
  • 6Ballani H, Francis P, Zhang X. A Study of Prefix Hijacking and Interception in the Intemet [ A ]. In Proc. ACM SIGCOMM 2007[ C]. Kyoto: ACM Press,2007.265- 276.
  • 7Ramachandran A,Feamster N. Understanding the Network-Level Behavior of Spammers[ A]. In Proc. ACM SIGCOMM 2006 [ C] .New York:ACM Press,2006.291 - 302.
  • 8Sauver J. S. Route Injection and Spam[ R]. In Messaging Anti-Abuse Working Group (MAAWG) 8th General meeting.2006.
  • 9Popescu A C,Premore B J, Underwood T. Anatomy of a Leak: AS9121[ OL]. http://nanog, org/mtg - 0505/underwood. html, 2008.
  • 10Karlin J, Forrest S, Rexford J. Pretty Good BGP: Improving BGP by Cautiously Adopting Routes[ A]. In Proc. IEEE ICNP 2006[ C]. Santa Barbara: IEEE Press, 2006.290 - 299.

共引文献21

同被引文献45

  • 1Lippert K J and Seger R A. The story behind network defense[C]. 8th International Conference on Information Technology: New Generations, Las Vegas, USA, Apr. 11 13,2011: 909-913.
  • 2Theodoridis G, Tsigkas O, and Tzovaras D. A novel unsupervised method for securing BGP against routing hijacks[C]. 27th International Symposium on Computer and Information Sciences, Paris, France, Oct. 3-4, 2012:21 -29.
  • 3Geoff H, Mattia R, and Grenville A. Securing BGP-A literature survey[J]. IEEE Communications Surveys Tutorials, 2011, 13(2): 199-222.
  • 4Andr6 M. Anomaly detection in enterprise networks[D].[Ph.D. dissertation], University of Porto, 2011.
  • 5Ganichev I, Dai B, Godfrey P B, et aL. YAMR: yet another multipth routing protocol[J], ACM SIGCOMM Computer Communication Review, 2010, 40(5): 14-19.
  • 6Kushman N, Kandula S, Katabi D, et al.. R-BGP: staying connected in a connected world[C]. 4th USENIX Symposium on Networked System Design 8z Implementation, Cambridge, USA, Apr. 11-13, 2007: 341-354.
  • 7Wang F and Gao L. Path diversity aware interdomain routing[C]. 28th IEEE International Conference on Computer Communications, Rio de Janeiro, Brazil, Apr. 19-25, 2009: 307-315.
  • 8Hansen A F, Kvalbein A, Cicic T, et al.. Resilient routing layers for recovery in packet networks[C]. International Conference on Dependable Systems and Networks, Yokohama, Japan, June 28-July 1, 2005: 238-247.
  • 9Kvalbein A, Hansen A F, Cicic T, et al.. Fast IP network recovery using multiple routing configurations[C]. 25th IEEE Conference on Computer Communications, Barcelona, Spain, Apr. 23 29, 2006: 1-11.
  • 10Hong Y. A practical system for centralized network control[D]. [Ph.D. dissertation], Carnegie Mellon University, 2010.

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部