• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Liu Xin, Wang Xiaoqiang, Zhu Peidong, Peng Yuxing. Security Evaluation for Inter-Domain Routing System in the Internet[J]. Journal of Computer Research and Development, 2009, 46(10): 1669-1677.
Citation: Liu Xin, Wang Xiaoqiang, Zhu Peidong, Peng Yuxing. Security Evaluation for Inter-Domain Routing System in the Internet[J]. Journal of Computer Research and Development, 2009, 46(10): 1669-1677.

Security Evaluation for Inter-Domain Routing System in the Internet

More Information
  • Published Date: October 14, 2009
  • For lack of effective security mechanism, the inter-domain routing system of the Internet, based on the border gateway protocol (BGP), faces serious security threats. Although many current researchers have conducted exhaustive research regarding the routing security problem of the BGP routing system in the Internet, few people quantify its security situation. Moreover, Internet network operators do need useful information to perceive the security status of their autonomous systems. In order to solve the problem, the authors analyze the hierarchical characteristics of the Internets inter-domain routing system, and propose a security evaluation model which makes use of anomalous BGP routes. Based on the route status tree exploited from hierarchical characteristics implicated in the BGP routing system, the model can describe the hierarchical relationship of various routing entities in it, store and record the security states of routes for every routing entity. Finally, the model can compute the routing security state of every entity according to the detected anomalous BGP routes. The experimental results show that the model can assess the security threat status of BGP routers, autonomous systems and the inter-domain routing system all together, and can provide valuable, intuitional curve for Internet network operators. The model has been applied to the BGP monitoring system.
  • Related Articles

    [1]Duan Wenxue, Hu Ming, Zhou Qiong, Wu Tingming, Zhou Junlong, Liu Xiao, Wei Tongquan, Chen Mingsong. Reliability in Cloud Computing System: A Review[J]. Journal of Computer Research and Development, 2020, 57(1): 102-123. DOI: 10.7544/issn1000-1239.2020.20180675
    [2]Lou Jungang, Jiang Jianhui, Shen Zhangguo, Jiang Yunliang. Software Reliability Prediction Modeling with Relevance Vector Machine[J]. Journal of Computer Research and Development, 2013, 50(7): 1542-1550.
    [3]Wu Caihua, Liu Juntao, Peng Shirui, Li Haihong. Deriving Markov Chain Usage Model from UML Model[J]. Journal of Computer Research and Development, 2012, 49(8): 1811-1819.
    [4]Li Haifeng, Li Qiuying, and Lu Minyan. Software Reliability Modeling with Logistic Test Coverage Function[J]. Journal of Computer Research and Development, 2011, 48(2): 232-240.
    [5]Mu Fei, Xue Wei, Shu Jiwu, and Zheng Weimin. An Analytical Model for Large-Scale Storage System with Replicated Data[J]. Journal of Computer Research and Development, 2009, 46(5): 756-761.
    [6]Zhang Hongcan, Xue Wei, and Shu Jiwu. An Expandable Distributed RAID Storage Cluster System[J]. Journal of Computer Research and Development, 2008, 45(4): 741-746.
    [7]Ren Xiaoxi, Li Renfa, Jin Shengzhen, Zhang Kehuan, Wu Qiang. Research on Reliability of a Reconfigurable Data Processing System Based on JBits[J]. Journal of Computer Research and Development, 2007, 44(4): 722-728.
    [8]Zhou Xuehai, Yu Jie, Li Xi, and Wand Zhigang. Research on Reliability Evaluation of Cache Based on Instruction Behavior[J]. Journal of Computer Research and Development, 2007, 44(4): 553-559.
    [9]Zhao Jing, Liu Hongwei, Cui Gang, and Yang Xiaozong. A Software Reliability Growth Model Considering Testing Environment and Actual Operation Environment[J]. Journal of Computer Research and Development, 2006, 43(5): 881-887.
    [10]Zhao Jing, Liu Hongwei, Cui Gang, and Yang Xiaozong. A Software Reliability Growth Model Considering Differences Between Testing and Operation[J]. Journal of Computer Research and Development, 2006, 43(3): 503-508.

Catalog

    Article views (832) PDF downloads (535) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return