• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Liu Xin, Wang Xiaoqiang, Zhu Peidong, Peng Yuxing. Security Evaluation for Inter-Domain Routing System in the Internet[J]. Journal of Computer Research and Development, 2009, 46(10): 1669-1677.
Citation: Liu Xin, Wang Xiaoqiang, Zhu Peidong, Peng Yuxing. Security Evaluation for Inter-Domain Routing System in the Internet[J]. Journal of Computer Research and Development, 2009, 46(10): 1669-1677.

Security Evaluation for Inter-Domain Routing System in the Internet

More Information
  • Published Date: October 14, 2009
  • For lack of effective security mechanism, the inter-domain routing system of the Internet, based on the border gateway protocol (BGP), faces serious security threats. Although many current researchers have conducted exhaustive research regarding the routing security problem of the BGP routing system in the Internet, few people quantify its security situation. Moreover, Internet network operators do need useful information to perceive the security status of their autonomous systems. In order to solve the problem, the authors analyze the hierarchical characteristics of the Internets inter-domain routing system, and propose a security evaluation model which makes use of anomalous BGP routes. Based on the route status tree exploited from hierarchical characteristics implicated in the BGP routing system, the model can describe the hierarchical relationship of various routing entities in it, store and record the security states of routes for every routing entity. Finally, the model can compute the routing security state of every entity according to the detected anomalous BGP routes. The experimental results show that the model can assess the security threat status of BGP routers, autonomous systems and the inter-domain routing system all together, and can provide valuable, intuitional curve for Internet network operators. The model has been applied to the BGP monitoring system.
  • Related Articles

    [1]Han Yanyan, He Yanru, Liu Peihe, Zhang Duo, Wang Zhiqiang, He Wencai. A Dynamic S-Box Construction and Application Scheme of ZUC Based on Chaotic System[J]. Journal of Computer Research and Development, 2020, 57(10): 2147-2157. DOI: 10.7544/issn1000-1239.2020.20200466
    [2]Hu Chaowen, Wu Changxing, Yang Yalian. Extended S-LSTM Based Textual Entailment Recognition[J]. Journal of Computer Research and Development, 2020, 57(7): 1481-1489. DOI: 10.7544/issn1000-1239.2020.20190522
    [3]Zhang Chao, Sun Guangyu, Zhang Xueying, Zhao Weisheng. Thermal Modeling and Management for Shift Operations of Racetrack Memory[J]. Journal of Computer Research and Development, 2017, 54(1): 154-162. DOI: 10.7544/issn1000-1239.2017.20150903
    [4]Li Xiaoqing, Li Hui, Yang Kai, and Ma Jianfeng. A Secure Routing Protocol Based on D-S Evidence Theory in Ad Hoc Networks[J]. Journal of Computer Research and Development, 2011, 48(8): 1406-1413.
    [5]Tang Yang, Pan Zhigeng, Tang Min, Pheng Ann Heng, Xia Deshen. Image Segmentation with Hierarchical Mean Shift[J]. Journal of Computer Research and Development, 2009, 46(9): 1424-1431.
    [6]Yu Qin and Mao Yuming. Self-Similarity Parameter Estimation and Scaling Properties Analyses of Aggregated Wireless Traffic[J]. Journal of Computer Research and Development, 2007, 44(1): 58-64.
    [7]Hu Yusuo and Chen Zonghai. A Novel Robust Estimation Algorithm Based on Linear EIV Model[J]. Journal of Computer Research and Development, 2006, 43(3): 483-488.
    [8]Wang Zhiming, Cai Lianhong, Ai Haizhou. Automatic Estimation of Visual Speech Parameters[J]. Journal of Computer Research and Development, 2005, 42(7): 1185-1190.
    [9]Liu Xiangdong, Luo Bin, and Chen Zhaoqian. Optimal Model Selection for Support Vector Machines[J]. Journal of Computer Research and Development, 2005, 42(4): 576-581.
    [10]Zheng Zhirong, Cai Yi, and Shen Changxiang. Research on an Application Class Communication Security Model on Operating System Security Framework[J]. Journal of Computer Research and Development, 2005, 42(2): 322-328.

Catalog

    Article views (832) PDF downloads (535) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return