期刊 域间路由协议前缀劫持行为模拟与分析  被引量:1

Simulation and Analysis of Large-Scale BGP Prefix Hijacking

在线阅读下载全文

作  者:王俊强 毛羽刚 朱培栋 

机构地区:91996部队 国防科学技术大学计算机学院

出  处:《计算机工程与科学》2011年第8期19-26,共8页Computer Engineering & Science

Simulation and Analysis of Large-Scale BGP Prefix Hijacking

基  金:国家自然科学基金资助项目(60873214)

摘  要:基于BGP的域间路由系统是Internet的核心设施,是保证整个网络互联及正常运行的关键。然而,由于BGP协议本身缺乏必要的安全机制而极易受到攻击。例如,前缀劫持就是针对BGP缺陷而实施的一种较难防范的攻击。近年来,已发生多起BGP前缀劫持事件,造成了严重危害。本文基于GT-NetS软件构建了一个大规模域间路由系统模拟环境,并在该模拟环境中进行了多次BGP前缀劫持测试,结合测试结果分析对影响BGP前缀劫持攻击范围的有关因素进行了研究。测试表明,BGP前缀劫持造成的受害范围与攻击发起路由器所属AS的层次和度数有着直接的关系。

The inter-domain routing system based on BGP is the core infrastructure of the Internet.It is also the key to ensuring interconnection and normal operation of the entire network.However,the BGP protocol itself is highly vulnerable to attacks due to the lack of necessary security mechanisms.For example,the BGP prefix hijacking is the one that is difficult to prevent.In recent years,there have been many BGP prefix hijacking incidents that caused serious harms.We have constructed a large-scale software simulation environment for inter-domain routing systems based on GTNetS,and have made a large number of BGP prefix hijacking tests,and we have studied the factors related to the attack scope of prefix hijacking.The tests show that the damage range caused by the BGP prefix hijacking has direct relationships with the levels and degrees of the AS from which the prefix hijacking is launched.

关 键 词:边界网关协议 自治系统 前缀劫持 模拟 GTNETS 

border gateway protocol  autonomous system  prefix hijacking  simulation  GTNetS 

分 类 号:TP393[自动化与计算机技术—计算机应用技术]

 

参考文献:

  • [1]Rekhter Y,Li T.A Border Gateway Protocol 4 (BGP4)[S].RFC 1771,1995. 被引量:1
  • [2]Nordstrom O,Dovrolis C.Beware of BGP Attacks[J].ACM SIGGCOMM Computer Communications Review,2004,34(2):1-8. 被引量:1
  • [3]Convery S,Cook D,Franz M.An Attack Tree for the Border Gateway Protocol[S].InternetDraft,2004. 被引量:1
  • [4]Kim J,Ko S Y,Nicol D M,et al.A BGP Attack Against Traffic Engineering[C]∥Proc of the 2004 Winter Simulation Conf,2004:326. 被引量:1
  • [5]Mahajan R,Wetherall D,Anderson T.Understanding BGP Misconfiguration[C]∥Proc of the 2002 Conf on Applications,Technologies,Architectures,and Protocols for Computer Communications,2002:3-16. 被引量:1
  • [6]Gao L.On Inferring Autonomous System Relationships in the Internet[J].Journal IEEE/ACM Trans on Networking,2001,9(6):733-745. 被引量:1
  • [7]BGP Best Path Selection Algorithm[EB/OL].[2006-0516].http://www.cisco.com/en/US/tech/tk365/technologies_tech_note09186a0080094431.shtml. 被引量:1
  • [8]Riley G F.LargeScale Network Simulations with GTNetS[C]∥Proc of the 2003 Winter Simulation Conf,2003:676-684. 被引量:1
  • [9]http://www.ece.gatech.edu/research/labs/MANIACS/BGP++/. 被引量:1
  • [10]Subramanian L,Agarwal S,Rexford J,et al.Characterizing the Internet Hierarchy from Multiple Vantage Points[C]∥Proc of IEEE INFOCOM'02,2002:618-627. 被引量:1
  • http://as-rank.caida.org/
  • Index of /data/2009[EB/OL].[2009-10-10].http://as-rank.caida.org/data/2009/.

 

耦合文献:

 

引证文献:

 

同被引文献:

 

相关期刊文献:

版权所有:扬州市科学技术情报研究所

地址:江苏省扬州市文昌中路403号

苏ICP备10006642号-2 苏公网安备 32100202010133号

建议您使用IE9.0及以上版本、谷歌、火狐等浏览器浏览本站!