期刊文献+

基于特征融合相似度的域间路由系统安全威胁感知方法 被引量:1

A threat perception method for inter-domain routing systems based on weighted similarity
原文传递
导出
摘要 针对域间路由系统的网络攻击技术日益复杂,尤其是近年出现的基于大规模LDo S(low-rate denial of service)的跨平面攻击,其造成的危害远大于传统网络攻击.已有域间路由系统安全技术主要研究如何解决BGP(border gateway protocol)协议缺乏路由真实性验证机制的问题,而针对域间路由系统的大规模LDo S攻击利用的是BGP协议自适应机制的特性,且用于LDo S攻击的流量与许多真实数据流的特征类似,使得现有很多方法难以有效应对.本文提出一种基于加权相似度的域间路由系统安全威胁感知方法,利用多个特征融合描述域间路由系统的安全状态,并结合网络流量的自相似特性,运用加权相似度计算方法量化实时特征值与正常态特征值的偏差,由此评估域间路由系统的安全状态.进一步,通过跟踪安全特征的实时变化情况,即可推断域间路由系统遭受攻击的类型.实验结果表明,该方法能够实现对域间路由系统安全状态的有效评估,在遭受控制平面攻击或数据平面攻击的初期阶段即能感知威胁,为网络管理员及时制定有效的应对策略提供可靠参考. BGP(border gateway protocol) based inter-domain routing systems play an important role in the Internet. However, the BGP has certain design flaws, which result in many serious security problems for interdomain routing systems. Compared to traditional attacks, such as prefix hijacking, large-scale LDo S attacks against inter-domain routing systems are extremely hard to detect, which is reflected in its attack traffic and reactions appearing to be legal. The concealment of such attacks makes existing security solutions insufficient.In this paper, we first analyze the feasibility of utilizing similarity theory for assessing the security situations in inter-domain routing systems. We then propose a similarity-theory-based method for evaluating the security situations in inter-domain routing systems. It uses multiple characteristics to describe the system security situation collectively and evaluates the security situation by measuring the deviation degree of the security characteristics to their norms. Because the ability of each characteristic to represent different attacks is not the same, we make use of weighted similarity to assess the deviation of the fusion characteristics from their normal state at various times. Experimental results show that our method can perceive threats in their early stages, regardless of an inter-domain routing system suffering from control plan attacks or data plan attacks.
作者 郭毅 段海新 张连成 邱菡 Yi GUO Haixin DUAN Liancheng ZHANG Han QIU(Institute for Network Science and Cyberspace, Tsinghua University, Beijing 100084, China 2. PLA Information Engineering University, Zhengzhou 450001, China)
出处 《中国科学:信息科学》 CSCD 北大核心 2017年第7期878-890,共13页 Scientia Sinica(Informationis)
基金 国家自然科学基金(批准号:61402525 61472215 61402526 61502528)资助项目
关键词 域间路由 数据平面攻击 威胁感知 加权相似度 特征偏差 inter-domain routing data plane attack threat perception weighted similarity characteristics deviation
  • 相关文献

参考文献3

二级参考文献99

  • 1陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:341
  • 2刘欣,朱培栋,米强,杨明军.基于规则的域间路由系统异常检测[J].国防科技大学学报,2006,28(3):71-76. 被引量:4
  • 3Murphy S. BGP Security Vulncrabilities Analysis [S]. IETF. RFC 4272, 2006.
  • 4Kevin B, Toni F, Jennifer R. A survey of BGP security [OL].[2008-03-04]. http://www. patrickmedaniel. org/ pubs/td-Sugj33. pdf.
  • 5Ola N, Constantinos D. Beware of BGP attacks [J]. ACM SIGCOMM Computer Communications Review, 2004, 34 (2) : 1-8.
  • 6Atkinson R, Floyd S. IAB Concerns & Recommendations Regarding Internet Research & Evolution [S]. IETF RFC 3869, 2004.
  • 7Popescu Alin C, Premore Brian J, Underwood Todd. Anatomy ofaleak: As9121 [EB/OL].[2008-03-04]. http:// www. nanog. org/mtg-0505/underwood. html.
  • 8Pakistan hijacks YouTube [EB/OL]. [2008-03-04]. http:// www. renesys. com/blog/2008/02/pakistan_hijacks_youtuhe_1. shtml.
  • 9Zhao X L, Pei D, Wang L, et al. Detection of invalid routing announcement in the Internet[C]//Proc of the Int Conf on Dependable Systems and Networks (DSN'02). Piscataway, NJ: IEEE, 2002: 59-68.
  • 10Kent S, Lynn C, Seo K. Secure border gateway protocol (SBGP ) [J]. IEEE Journal on Selected Areas in Communications: Special Issue on Network Security, 2000, 18(4) : 582-592.

共引文献43

同被引文献15

引证文献1

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部