期刊文献+

时空尺度下域间路由事件的定位方法

Localization of inter-domain routing events in temporal and spatial scales
下载PDF
导出
摘要 针对现有的定位方法无法在时间演化尺度下对域间路由事件进行有效定位的问题,提出了一种时空尺度下的域间路由事件定位方法。从BGP路由表中提取事件在不同时刻下AS级网络的可达性特征和连通性特征,在此基础上计算相邻时刻的时序距离,并将距离最大者推断为事件触发源所在的时间窗口;对该窗口内的AS级网络进行遍历,将具有最高召回率和精度的网络元素识别为事件的触发源。分别以网络瘫痪事件和前缀劫持事件进行实验验证,结果表明,该方法能够准确推断不同类型域间路由事件的起始时间和触发源。 The existing localization methods can not effectively localize inter-domain routing events in time-evolving scale, this paper proposed an inter-domain routing event localization method in temporal and spatial scales. The method could extract the reachability and connectivity features of AS-level Internet at different moments of an event from BGP routing table, and based on what it could compute the temporal distances between adjacent moments, then deduced the time window of the event by maximizing the distance. By traversing all network elements of the AS-level Internet in the time window, the method could lo- cate the trigger source of the event by maximizing recall and precision of each element. Taking network outage event and prefix hijack event for experimental analysis, the results show that the localization method can deduce the start time and trigger source of different kinds of inter-domain routing events accurately.
出处 《计算机应用研究》 CSCD 北大核心 2017年第2期526-531,共6页 Application Research of Computers
基金 国家自然科学基金资助项目(61405248 61503394) 安徽省青年科学基金资助项目(1408085QF131 1508085QF121)
关键词 域间路由 时空尺度 事件定位 时序距离 inter-domain routing temporal and spatial scale event localization temporal distance
  • 相关文献

参考文献1

二级参考文献9

  • 1王福豹,史龙,任丰原.无线传感器网络中的自身定位系统和算法[J].软件学报,2005,16(5):857-868. 被引量:672
  • 2LIU Dong-gang, NING Peng, DU Wen-liang. Detecting malicious beacon nodes for secure location discovery in wireless sensor networks [C]//Proc of the 25th Conference on Distributed Computing Systems. Washington DC : IEEE Computer Society,2005:609-691.
  • 3WEI Ya-wen, YU Zhen, GUAN Yong. Location verification algorithms for wireless sensor networks [ C ]//Proc of the 27th International Conference on Distributed Computing Systems. 2007:70-77.
  • 4SASTRY N, SHANKAR U, WAGNER D. Secure verification of location claims [ C]//Proc of the ACM Workshop on Wireless Security (WiSe). New York :ACM Press ,2003 : 1-10.
  • 5CAPKUN S, HUBAUX J P. Secure positioning of wireless devices with application to sensor networks [ C ]//Proc of the INFOCOM 2005. 2005 : 1917-1928.
  • 6BAHL P,PADMANABHAN V N. RADAR:an in building RF-based user location and tracking system [ C ]//Proc of the INFOCOM 2000. 2000:775-784.
  • 7DU Wei-liang, FANG Lei, NING Peng. LAD : localization anomaly detection for wireless sensor networks [ C ]//Pine of the 19th IPDPS. Orlando, FL : Academic Press,2006:874- 886.
  • 8李建中,高宏.无线传感器网络的研究进展[J].计算机研究与发展,2008,45(1):1-15. 被引量:441
  • 9曹晓梅,俞波,陈贵海,任丰原.传感器网络节点定位系统安全性分析[J].软件学报,2008,19(4):879-887. 被引量:15

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部