期刊文献+

一种基于NFV的检测OSPF双LSA攻击的方法 被引量:1

NFV Based Detection Method Against Double LSAs Attack on OSPF Protocol
下载PDF
导出
摘要 OSPF协议是因特网中使用最广泛和最成功的内部网关路由协议之一。尽管当前对OSPF协议的安全性已有许多研究,但仍缺乏有效的检测路由欺骗攻击的方法,难以保证网络中OSPF路由的安全性。通过研究OSPF双链路状态通告(LSA)攻击方法的原理,给出了用于确定攻击者的3个必要条件,提出了一种检测OSPF双LSA攻击的方法。基于网络功能虚拟化(NFV)技术,设计实现了检测中间盒与分析服务器用于检测攻击与消除路由污染。检测中间盒负责从各链路捕获相关OSPF分组,将trace记录发送给分析服务器;分析服务器调用检测算法分析处理接收到的trace记录流,若检测到攻击则告警,同时指令检测中间盒来恢复污染路由。原型系统的实验结果表明,所提方法能够在IP网络或NFV网络中准确高效地检测出OSPF双LSA攻击,并且实现的系统具有性价比高、易于部署等优良特点。 The OSPF protocol is one of the most widely used and successful interior gateway routing protocols in the Internet.Although there have been lots of investigations on the security of the OSPF protocol,there is still a lack of effective detection methods against the route spoofing attacks,so it is difficult to ensure the security of the OSPF routing in networks.By studying the principle of the double link state advertisements(LSAs)attack on the OSPF protocol,this paper presented three necessary conditions that are used to detect the attack,and proposed a detection method against the double LSAs attack on the OSPF protocol.Then,a corresponding detection middle box and analysis server used to detect attacks and clear up their routing pollution were designed and implemented based on the network function virtualization(NFV)technology.The detection middle box is responsible for capturing relevant OSPF packets from various links,sending the trace records to the analysis server,and receiving instructions from the analysis server to restore the polluted routes.The analysis server invokes the detection algorithm to analyze and process the trace record stream,and an alarm is given and an instruction is sent to the detection middle box to restore the contaminated routes if an attack is detected.The experimental results of the prototype show that the proposed method can detect the OSPF double LSAs attack in both IP networks or NFV networks accurately and efficiently,and the prototype has excellent characteristics such as high cost performance and easy to deploy.
作者 李鹏飞 陈鸣 邓理 钱红燕 LI Peng-fei;CHEN Ming;DENG Li;QIAN Hong-yan(Department of Computer Science and Technology,Nanjing University ofAeronautics and Astronautics,Nanjing 211106,China)
出处 《计算机科学》 CSCD 北大核心 2019年第B06期343-347,共5页 Computer Science
基金 国家自然科学基金项目(61772271,61379149)资助
关键词 OSPF 路由协议攻击 网络安全 网络功能虚拟化 检测方法 OSPF Routing protocol attack Network security Network functionvirtualization Detection method
  • 相关文献

参考文献1

二级参考文献11

  • 1关义章 蒋继红.信息系统安全工程学[M].北京:金城出版社,1998..
  • 2(美)StallingsW.网络安全要素--应用与标准[M].北京:人民邮电出版社,2000..
  • 3Computer Security Institute. 2000 CSI/FBI Computer Crime and Security Survey[J].Computer Security Issues and Trends, 2000,5(1).
  • 4Pethia, Richard. Intemet Security Issues: Testimony before the U.S. Senate Judiciary Committee[M]. Carnegie Mellon University, Sottware Engineering Institute, 2000.
  • 5Allen, Julia, et al. Improving the Security of Networked Systoms[J]. Crosstalk: The Journal of Defense Software Engineering, 2000,13(10).
  • 6Wood, Charles Cresson. Information Security Policies Made Easy Version 7[M]. BaselineSoflware, Inc, 2000.
  • 7Kossakowski, Klaus-Peter, Allen, Julia. Securing Public Web Servers (CMU/SEI-SIM-011). Pittsburgh, Pa.: Software Engineering Institute[M]. Carnegie Mellon University, 2000.
  • 8(美)StaUingsW.络安全要素—应用与标准[M].北京:人民邮电出版社,2000..
  • 9关义章 蒋继红.信息系统安全工程学[M].北京:金城出版社,1998..
  • 10前导工作室译.网络安全技术内幕[M].北京:机械工业出版社,1999..

共引文献36

同被引文献10

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部