期刊文献+

BGP路由泄露研究 被引量:2

Study on BGP route leak
下载PDF
导出
摘要 随着互联网规模的急剧扩大,边界网关协议(BGP,border gateway protocol)在域间路由系统中的作用愈加重要。BGP本身存在很大的安全隐患,导致前缀劫持、AS_PATH劫持及路由泄露攻击事件频频发生,给互联网造成了严峻的安全威胁。目前,国内外针对路由泄露的介绍及安全研究机制相对较少。对BGP路由泄露进行了详细研究,介绍了BGP内容、路由策略及制定规则,分析了重大路由泄露安全事件及发生路由泄露的6种类型,并比较了当前针对路由泄露的安全机制和检测方法,最后对路由泄露安全防范机制提出了新的展望。 With the rapid expansion of the scale of Internet, BGP plays a more and more important role in the Inter domain routing system. BGP has a lot of security risks, which result in prefix hijacking, AS_PATH hijacking and route leak attacks occuring frequently, causing serious threats to the Internet. In currently, the content introduction and security research mechanism were little, so a detailed study of BGP route leak was carried out. The BGP protocol, route policy and established rules were introduced, six types of major route leak security incidents were analysised, the current security mechanisms and methods were summarized and compared to solve and detect route leak. In the last, a new prospect for the security and protection mechanism of route leak was proposed.
出处 《网络与信息安全学报》 2016年第8期54-61,共8页 Chinese Journal of Network and Information Security
基金 国家自然科学基金资助项目(No.61303242)~~
关键词 BGP 路由策略 路由泄露 路由安全 BGP route policy route leak route security
  • 相关文献

参考文献2

二级参考文献87

  • 1Rosen EC. Exterior gateway protocol. RFC 827, 1982.
  • 2Bono VJ. 7007 explanation and apology. 1997. http://www.merit.edu/mail.archives/nanog/1997-04/msgOO444.html.
  • 3Rensys Biog. Internet-Wide catastrophe--Last year. 2005. http://www.renesys.com/blog/2005/12/internetwide_nearcatastrophela. shtrnl.
  • 4Rensys Biog. Pakistan hijacks YouTube. 2008. http://www.renesys.com/blog/2008/02/pakistan_hijacks_youtube_l .shtml.
  • 5BGPmon Biog. How the Internet in Australia went down under. 2012. http://bgpmon.net/blog/?p=554.
  • 6Pilosov A, Kapela T. Stealing the Intemet: An Interact-scale man in the middle attack. Technical Report, Las Vegas: Defeon, 2008. https://www.defcon.org/images/defcon- 16/dc 16-presentations/defcon- 16-pilosov-kapela.pdf.
  • 7Department of Homeland Security. The national strategy to secure cyberspace. Technical Report, Washington: Department of Homeland Security, 2003, http://www.us-cert.gov/reading_roorn/eyberspace_strategy.pdf.
  • 8Kuhn R, Sriram K, Montgomery D. Border gateway protocol security. Technical Report, 800-54, Gaithersburg: NIST, 2007.
  • 9Secure BGP project (S-BGP). 2004. http://www.ir.bbn.com/sbgp/.
  • 10Securing BGP through SecureOrigin BGP. 2006. http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_6-3/securing_ bgp_sobgp.html.

共引文献37

同被引文献15

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部