期刊文献+

基于信任量化的自治系统恶意性判定 被引量:1

Decision for Autonomous System Maliciousness Based on Quantitative Trust Measurement
下载PDF
导出
摘要 鉴于当前域间路由系统未能有效解决自治系统节点的行为恶意性判定问题,论文在研究人际网络信任关系的基础上,提出一种基于信任量化的自治系统恶意性判定模型。模型通过定义直接判定、协作判定及配合度3项判定准则,综合分析及量化目标自治域的路由交互行为,同时定义节点参与度作为最终判定结果的放大因子。基于仿真路由拓扑进行验证,结果表明,在面对典型的路由欺骗、服务受限及协作节点误报的情况下,该模型均能够有效识别和判定目标自治域节点的恶意行为,具备较好准确性和稳定性。 Decision for Autonomous System maliciousness has not been effectively resolved within the current inter-domain routing system.On the basis of the research on trust relationship via the human society networks,a model of decision for the Autonomous System maliciousness based on the quantitative trust measurement is proposed.Three criteria including direct decision,collaborative decision and degree of coordination are defined,on which the comprehensive analysis and quantization towards the interactive routing behaviors of target Autonomous System,and the degree of participation is also defined as the amplifying factor.Experiments based on simulation topology is launched and the result indicates that,under the typical circumstances of routes spoofing,services restriction and intended incorrect decision by collaborative Autonomous System,the model can effectively discriminate and make reasonable decisions to the target malicious behavior,with good accuracy and stability.
出处 《计算机科学》 CSCD 北大核心 2014年第S1期357-360,368,共5页 Computer Science
基金 国家863计划项目(2009AA01A334 2008AA01A323 2008AA01A326)资助
关键词 域间路由系统 自治系统 信任量化 恶意性判定 Inter-domain routing system,Autonomous system,Quantitative trust measurement,Maliciousness decision
  • 相关文献

参考文献6

二级参考文献113

  • 1陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:342
  • 2刘欣,朱培栋,米强,杨明军.基于规则的域间路由系统异常检测[J].国防科技大学学报,2006,28(3):71-76. 被引量:4
  • 3李景涛,荆一楠,肖晓春,王雪平,张根度.基于相似度加权推荐的P2P环境下的信任模型[J].软件学报,2007,18(1):157-167. 被引量:115
  • 4Murphy S. BGP Security Vulncrabilities Analysis [S]. IETF. RFC 4272, 2006.
  • 5Kevin B, Toni F, Jennifer R. A survey of BGP security [OL].[2008-03-04]. http://www. patrickmedaniel. org/ pubs/td-Sugj33. pdf.
  • 6Ola N, Constantinos D. Beware of BGP attacks [J]. ACM SIGCOMM Computer Communications Review, 2004, 34 (2) : 1-8.
  • 7Atkinson R, Floyd S. IAB Concerns & Recommendations Regarding Internet Research & Evolution [S]. IETF RFC 3869, 2004.
  • 8Popescu Alin C, Premore Brian J, Underwood Todd. Anatomy ofaleak: As9121 [EB/OL].[2008-03-04]. http:// www. nanog. org/mtg-0505/underwood. html.
  • 9Pakistan hijacks YouTube [EB/OL]. [2008-03-04]. http:// www. renesys. com/blog/2008/02/pakistan_hijacks_youtuhe_1. shtml.
  • 10Zhao X L, Pei D, Wang L, et al. Detection of invalid routing announcement in the Internet[C]//Proc of the Int Conf on Dependable Systems and Networks (DSN'02). Piscataway, NJ: IEEE, 2002: 59-68.

共引文献23

同被引文献9

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部