[1]刘欣,刘华富. 互联网前缀劫持攻击研究[J].计算机技术与发展,2015,25(02):131-134.
 LIU Xin,LIU Hua-fu. Research on Prefix Hijacking in Internet[J].,2015,25(02):131-134.
点击复制

 互联网前缀劫持攻击研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
25
期数:
2015年02期
页码:
131-134
栏目:
安全与防范
出版日期:
2015-02-10

文章信息/Info

Title:
 Research on Prefix Hijacking in Internet
文章编号:
1673-629X(2015)02-0131-04
作者:
 刘欣刘华富
 长沙学院 计算机系
Author(s):
 LIU XinLIU Hua-fu
关键词:
 边界网关协议自治系统前缀劫持最优路由
Keywords:
 BGPautonomous systemprefix hijackingbest routing
分类号:
TP393
文献标志码:
A
摘要:
 前缀劫持攻击是互联网BGP域间路由系统中的首要安全威胁,至今还无有效解决该问题的方案。以前缀劫持攻击为研究对象,分析了前缀劫持攻击产生的具体原因,展现了该攻击在自治系统内部以及在自治系统之间的表现形式与影响;从前缀劫持攻击的危害程度,分析并划分了前缀劫持攻击的基本形态,讨论了各种前缀劫持攻击的基本特性。分析结果表明,子前缀劫持的危害最严重,确切前缀劫持的影响最复杂,而父前缀劫持最易被发现且危害相对较小。
Abstract:
 Prefix hijacking is the primary security threat in the Internet’ s BGP system,and presently there is no effective solution against it. Taking the prefix hijacking as the research object,analyze the causes of producing prefix hijacking,showing the form and influence of attack within the autonomous system and between autonomous systems. From the damage degree of prefix hijacking,analyze and divide the basic form of prefix hijacking,and discuss the basic characteristics of various prefix hijackings. The results show that the sub-prefix hijacking is of the most serious hazards,the exact prefix hijacking’ s impact is the most complex,while the father prefix hijacking is found most easily and the smallest harm relatively.

相似文献/References:

[1]陈凤 宋玲.BGP/MPLS IP VPN的IPv6扩展研究[J].计算机技术与发展,2007,(10):147.
 CHEN Feng,SONG Ling.Study of Extension for IPv6 of BGP/MPLS IP VPN[J].,2007,(02):147.
[2]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(02):1.
[3]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(02):5.
[4]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(02):13.
[5]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(02):21.
[6]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(02):25.
[7]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(02):29.
[8]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(02):34.
[9]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(02):38.
[10]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(02):43.

更新日期/Last Update: 2015-04-28