期刊文献+

互联网前缀劫持攻击研究 被引量:4

Research on Prefix Hijacking in Internet
下载PDF
导出
摘要 前缀劫持攻击是互联网BGP域间路由系统中的首要安全威胁,至今还无有效解决该问题的方案。以前缀劫持攻击为研究对象,分析了前缀劫持攻击产生的具体原因,展现了该攻击在自治系统内部以及在自治系统之间的表现形式与影响;从前缀劫持攻击的危害程度,分析并划分了前缀劫持攻击的基本形态,讨论了各种前缀劫持攻击的基本特性。分析结果表明,子前缀劫持的危害最严重,确切前缀劫持的影响最复杂,而父前缀劫持最易被发现且危害相对较小。 Prefix hijacking is the primary security threat in the Internet' s BGP system,and presently there is no effective solution against it. Taking the prefix hijacking as the research object, analyze the causes of producing prefix hijacking, showing the form and influence of attack within the autonomous system and between autonomous systems. From the damage degree of prefix hijacking, analyze and divide the basic form of prefix hijacking,and discuss the basic characteristics of various prefix hijackings. The results show that the sub-prefix hijacking is of the most serious hazards, the exact prefix hijacking' s impact is the most complex, while the father prefix hijacking is found most easily and the smallest harm relatively.
作者 刘欣 刘华富
出处 《计算机技术与发展》 2015年第2期131-134,139,共5页 Computer Technology and Development
基金 国家自然科学基金资助项目(61379117) 湖南省教育科研基金项目(湘教通[2014]77号)
关键词 边界网关协议 自治系统 前缀劫持 最优路由 BGP autonomous system prefix hijacking best routing
  • 相关文献

参考文献14

二级参考文献81

  • 1江晓峰,高兴锁,周海涛.基于MPLS的VPN技术探究[J].计算机技术与发展,2006,16(3):53-55. 被引量:3
  • 2刘欣,朱培栋,米强,杨明军.基于规则的域间路由系统异常检测[J].国防科技大学学报,2006,28(3):71-76. 被引量:4
  • 3Kent S, Lynn C, Seo K. Secure border gateway protocol. IEEE JSAC, 2000, 18(4): 582-592.
  • 4White R. Securing BGP through secure origin BGP. The Internet Protocol Journal, 2003, 6(3) : 15-22.
  • 5van Oorschot P C, Wan T, Kranakis E. On Inter domain routing security and pretty secure BGP (psBGP). ACM T1SSEC, 2007, 10(3): 1-41.
  • 6Aiello W, Ioannidis J, McDaniel P. Origin authentication ininterdomain routing//Proceedings of the 10th ACM Conference Computer and Communications Security. Washington D. C. , USA, 2003:165-178.
  • 7Goodell G, Aiello W, Griffin T, Ioannidis J, McDaniel P, Rubin A. Working around BGP' An incremental approach to improving security and accuracy of interdomain routing//Proceedings of the ISOC NDSS 2003. San Diego, California, USA, 2003.
  • 8Subramanian L, Roth V, Stoica I, Shenker S, Katz R H Listen and whisper: Security mechanisms for BGP//Proceed ings of the 1st Symposium Networked System Design and Im plementation. San Francisco, California, USA, 2004.
  • 9Karlin J, Forrest S, Rexford J. Pretty good BGP.. Improving BGP by cautiously adopting routes//Proceedings of the IEEE International Conference on Network Protocols. Santa Bar- bara, California, USA, 2006:290-299.
  • 10Shamir A. Identity-based cryptosystems and signature schemes//Proceedings of the Crypto. Santa Barbara, California, USA, 2004:47-53.

共引文献51

同被引文献15

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部