期刊文献+

针对BGP路由器的DDoS攻击及防范措施 被引量:3

DDoS Attack Against Router with Border Gateway Protocol and Precaution
下载PDF
导出
摘要 利用有限状态机对BGP协议进行分析,结果表明使用BGP协议通信的路由器其路由表更新机制存在安全漏洞,在此基础上,提出一种针对BGP路由器的分布式拒绝服务(DDoS)攻击方法,并根据BGP路由器的通信数据,设计实现一款测试软件RouterTest用于模拟对路由器的DDoS攻击,实验结果证明了该攻击方法的有效性,并针对该攻击提出相应的防范措施。 This paper uses Finite State Machine(FSM) to analyze Border Gateway Protocol(BGP),whose results show that the update mechanism of BGP routers has safe defects.A Distributed Denial of Service(DDoS) attack method is proposed for routers with BGP.According to the communication data of BGP routers,a test software named RouterTest is designed and implemented to simulate DDoS attacks on routers.Experimental results demonstrate the effectiveness of the attack.Corresponding precautions against the attacks are also proposed.
出处 《计算机工程》 CAS CSCD 2012年第19期103-106,共4页 Computer Engineering
基金 国家自然科学基金资助项目(60803155)
关键词 路由器 BGP协议 分布式拒绝服务攻击 有限状态机 路由表计算 router Border Gateway Protocol(BGP) Distributed Denial of Service(DDoS) attack Finite State Machine(FSM) routing table computing
  • 相关文献

参考文献7

二级参考文献54

  • 1孙知信,李清东.路由器端防范DDos攻击机制综述[J].南京邮电大学学报(自然科学版),2007,27(1):89-96. 被引量:8
  • 2李金明,王汝传.基于VTP方法的DDoS攻击实时检测技术研究[J].电子学报,2007,35(4):791-796. 被引量:18
  • 3Rekhter Y. A Border Gateway Protocol 4 (BGP-4)[S]. RFC4271, 2006.
  • 4Advanced Network Technology Center. University of Oregon Route Views Project[Z]. (2007-10-01). http://www.routeviews.org.
  • 5Huston G BGP Table Data[Z]. (2007-10-01 ). http://bgp.potaroo.net/.
  • 6Kruse R L, Tondo C L, Leung B P. Data Structures & Program Design in C[M]. 2nd ed. [S. l.]: Prentice Hall, 1996-07.
  • 7Brown N. A Final Word on AVL Trees[Z]. (2007-10-01). http://neil. brown.name/blog/.
  • 8Worldwide Infrastructure Security Report,Volume Ⅲ[OL].Arbor Networks,http://www.arbornetworks.com/report,September 2007.
  • 9Dittrich D.Distributed Denial of Service(DDoS) Attacks/tools[OL].http://staff.washington.edu/dittricb/misc/ddos/.
  • 10Kargl F,Maier J,Weber M.Protecting web servers from distributed denial of service attacks[A].In Proc.International Conference on World Wide Web[C].2001.

共引文献40

同被引文献22

引证文献3

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部