期刊文献+

穿越自治系统联盟的域间路由安全机制

Inter-domain routing security mechanism for crossing autonomous system alliance
下载PDF
导出
摘要 通过对SE-BGP(security enhanced BGP)的研究与分析,发现此方案不仅无法认证动态变化的跨联盟AS(autonomous system),也无法抵御其自身所发起的主动攻击。为了解决SE-BGP存在的安全问题,设计了二层跨联盟等级结构CAHS(cross-alliance hierarchical structure),基于CAHS结构,借鉴护照签证思想,利用递增散列——Ad HASH(additive hash)的特性提出了一种跨联盟安全机制SCA-BGP(secure crossing alliance for BGP)。该机制具有更高的安全性,可以有效地认证跨联盟AS的身份及行为授权,还可对其所携带的信息进行安全验证。实验分析表明,SCA-BGP可以有效地减少所需证书的规模和额外的时间开销,具有更好的可扩展性和网络收敛性能。 Through studying and analyzing SE-BGP (security enhanced BGP), it was found that it couldn't validate thecross-alliance AS (autonomous system) and defense the self-lannched active attack. To solve the security problems,two-layer cross-alliance hierarchical structure CAHS (cross-alliance hierarchical structure) was designed. Based onCAHS, using the idea of passport visa and the features of AdHASH (additive hash), a cross-alliance BGP securitymechanism SCA-BGP (secure crossing alliance for BGP) was proposed. The mechanism has higher security, which isable to effectively validate the identities and behavior authorization of the cross-alliance AS as well as the message car-ried by them. The experiment results show that SCA-BGP can effectively reduce the certificate scale and extra time over-head to get better scalability and convergence performance.
出处 《通信学报》 EI CSCD 北大核心 2014年第10期155-164,共10页 Journal on Communications
基金 国家自然科学基金资助项目(60773102) 国家自然科学基金与中国工程院联合基金资助项目(U0970122)~~
关键词 递增散列 SE-BGP SCA-BGP cross-alliance AS AdHASH
  • 相关文献

参考文献20

  • 1REKHTER Y’ LI T,HARES S. A Border Gateway Protocol 4(BGP-4)[EB/OL]. http://datatracker.ietf.org /doc/rfc4271/. 2006.
  • 2KENT S,LYNN C,SEO K. Secure border gateway protocol(S-BGP)[J]. IEEE Journal on Selected Areas in Communications, 2000,18(4): 582-592.
  • 3WHITE R. Securing BGP through secure origin BGP (soBGP)[J]. TheInternet Protocol Journal,2003, 6(3):15-22.
  • 4OORSCHOT P C, WAN T, KRANAKIS E. On inter-domain routingsecurity and pretty secure BGP (psBGP)[J]. ACM Transactions on In-formation and System Security (TISSEC), 2007,10(3): 11.
  • 5胡湘江,朱培栋,龚正虎.SE-BGP:一种BGP安全机制[J].软件学报,2008,19(1):167-176. 被引量:18
  • 6王滨,安金梁,吴春明,兰巨龙.基于分治策略的BGP安全机制[J].通信学报,2012,33(5):91-98. 被引量:3
  • 7KARLIN J, FORREST S, REXFORD J. Pretty good BGP: improvingBGP by cautiously adopting routes[A]_ Proceedings of the 2006 IEEEInternational Conference on Network Protocols [C]. Washingdon, DC,USA, 2006.290-299.
  • 8SUBRAMANIAN L,ROTH V,STOICA I, et al. Listen and whisper:Security mechanisms for BGP[A]. Sjgnposium on Networked SystemsDesign and Implementation (NSDI2004)[C]. 2004. 29-31.
  • 9YUN J K, BYUN C H,KIM Y. Architecture of the remote routingvalidation tool for BGP anomaly detection[A]. Proceedings of the2012 ACM Research in Applied Computation Symposium[C]. CA,USA, 2012. 232-236.
  • 10GAO L. On inferring autonomous system relationships in the Inter-net[J]. IEEE/ACM Transactions on Networking, 2001, 9(6):733-745.

二级参考文献32

  • 1REKHTER Y, LIT. A border gateway protocol 4 (BGP-4)[EB/OL]. http://datatracker.iet f.org/doc/rfc4271/,2006.
  • 2MURPHY S. BGP security vulnerabilities analysis[EB/OL], http:// datatracker.ietf.org/doc/rfc4272/,2006.
  • 3KENT S, LYNN C, SEO K. Secure border gateway protocol (S-BGP)[J]. IEEE Journal on Selected Areas in Communications, 2000, 18(4): 582-592.
  • 4KRANAKIS E, OORSCHOT C. On inter-domain routing security and pretty secure BGP (psBGP)[J]. ACM Trans on Information and Sys- tem Security, 2007,10(3 ): 11.
  • 5WHITE R. Securing BGP through secure origin BGP (soBGP)[J]. The Internet Protocol Journal, 2003,6(3): 15-22.
  • 6SNBRAMANIAN L, ROTH V, STOICA L, et al.Listen and whisper: security mechanisms for BGP[A]. Proc of the 1st Symposium on Net- worked Systems Design and Implementation[C]. San Francisco, CA, USA,2004.
  • 7BONEH D, GENTRY C, LYNN B, et al.Aggregate and verifiably encrypted signatures from bilinear maps[A]. EUROCRYPT 2003, vol- ume 2656 of Lecture Notes in Computer Science[C]. Springer-Verlag, 2003.416-423.
  • 8GENTRY C, RAMZAN Z. Identity-based aggregate signatures[A]. PKC 2006: 9th International Conference on Theory and Practice of Public Key Cryptography[C]. Springer-Verlag, 2006.257-273.
  • 9LU S, OSTROVSKY R, SAHAI A, et al. Sequential aggregate signa- tures and multisignatures without random oracles[A]. EUROCRYPT 2006[C]. Springer-Verlag, 2006.465-485.
  • 10BOLDYREVA A, GENTRY C, O'NEILL A, et al. Ordered multisig- natures and identity-based sequential aggregate signatures, with appli- cations to secure routing[A]. ACM CCS 07: 14th Conference on Computer and Communications Security[C]. 2007.276-285.

共引文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部