• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Liu Xin, Wang Xiaoqiang, Zhu Peidong, Peng Yuxing. Security Evaluation for Inter-Domain Routing System in the Internet[J]. Journal of Computer Research and Development, 2009, 46(10): 1669-1677.
Citation: Liu Xin, Wang Xiaoqiang, Zhu Peidong, Peng Yuxing. Security Evaluation for Inter-Domain Routing System in the Internet[J]. Journal of Computer Research and Development, 2009, 46(10): 1669-1677.

Security Evaluation for Inter-Domain Routing System in the Internet

More Information
  • Published Date: October 14, 2009
  • For lack of effective security mechanism, the inter-domain routing system of the Internet, based on the border gateway protocol (BGP), faces serious security threats. Although many current researchers have conducted exhaustive research regarding the routing security problem of the BGP routing system in the Internet, few people quantify its security situation. Moreover, Internet network operators do need useful information to perceive the security status of their autonomous systems. In order to solve the problem, the authors analyze the hierarchical characteristics of the Internets inter-domain routing system, and propose a security evaluation model which makes use of anomalous BGP routes. Based on the route status tree exploited from hierarchical characteristics implicated in the BGP routing system, the model can describe the hierarchical relationship of various routing entities in it, store and record the security states of routes for every routing entity. Finally, the model can compute the routing security state of every entity according to the detected anomalous BGP routes. The experimental results show that the model can assess the security threat status of BGP routers, autonomous systems and the inter-domain routing system all together, and can provide valuable, intuitional curve for Internet network operators. The model has been applied to the BGP monitoring system.
  • Related Articles

    [1]Liu Linfeng, Yu Zixing, Zhu He. A Link Prediction Method Based on Gated Recurrent Units for Mobile Social Network[J]. Journal of Computer Research and Development, 2023, 60(3): 705-716. DOI: 10.7544/issn1000-1239.202110432
    [2]Jiao Xu, Xiao Yingyuan, Zheng Wenguang, Zhu Ke. Research Progress of Recommendation Technology in Location-Based Social Networks[J]. Journal of Computer Research and Development, 2018, 55(10): 2291-2306. DOI: 10.7544/issn1000-1239.2018.20170489
    [3]Liu Yong, Han Xue, Li Jinbao, Ren Qianqian, Wang Nan. Collaboration Algorithm in Social Networks Based on Tasks with Partial Relation[J]. Journal of Computer Research and Development, 2016, 53(11): 2654-2665. DOI: 10.7544/issn1000-1239.2016.20150617
    [4]Hu Kaixian, Liang Ying, Xu Hongbo, Bi Xiaodi, Zuo Yao. A Method for Social Network User Identity Feature Recognition[J]. Journal of Computer Research and Development, 2016, 53(11): 2630-2644. DOI: 10.7544/issn1000-1239.2016.20150219
    [5]LiJin, YueKun, ZhangDehai, LiuWeiyi. Robust Influence Blocking Maximization in Social Networks[J]. Journal of Computer Research and Development, 2016, 53(3): 601-610. DOI: 10.7544/issn1000-1239.2016.20148341
    [6]Sun Huanliang, Jin Mingyu, Liu Junling, Yu Ge. Methods for Team Formation Problem with Grouping Task in Social Networks[J]. Journal of Computer Research and Development, 2015, 52(11): 2535-2544. DOI: 10.7544/issn1000-1239.2015.20148136
    [7]Lan Mengwei, Li Cuiping, Wang Shaoqing, Zhao Kankan, Lin Zhixia, Zou Benyou, Chen Hong. Survey of Sign Prediction Algorithms in Signed Social Networks[J]. Journal of Computer Research and Development, 2015, 52(2): 410-422. DOI: 10.7544/issn1000-1239.2015.20140210
    [8]Wang Li, Cheng Suqi, Shen Huawei, Cheng Xueqi. Structure Inference and Prediction in the Co-Evolution of Social Networks[J]. Journal of Computer Research and Development, 2013, 50(12): 2492-2503.
    [9]Li Peng, Wang Bin, Shi Zhiwei, Cui Yachao, and Li Hengxun. Tag-TextRank: A Webpage Keyword Extraction Method Based on Tags[J]. Journal of Computer Research and Development, 2012, 49(11): 2344-2351.
    [10]Kang Le, Jing Jiwu, and Wang Yuewu. The Trust Expansion and Control in Social Network Service[J]. Journal of Computer Research and Development, 2010, 47(9): 1611-1621.

Catalog

    Article views (832) PDF downloads (535) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return