首页 | 本学科首页   官方微博 | 高级检索  
     

边界路由器BGP协议的脆弱性
引用本文:庞玲. 边界路由器BGP协议的脆弱性[J]. 计算机系统应用, 2013, 22(1): 157-161
作者姓名:庞玲
作者单位:四川行政学院 计算机系, 成都 610072
摘    要:深入地研究了骨干路由器上BGP协议的脆弱性,重点分析了CXPST算法的攻击原理,并提出了改进型的震荡路径选取策略,从理论上证明了改进型震荡路径选取策略的更优性.实验测试表明,利用本文设计的BGP协议攻击算法比CXPST算法攻击效果更明显,能够在更短时间内导致运行BGP协议的骨干路由器陷入瘫痪.

关 键 词:BGP协议  脆弱性  路由器  CXPST  DDoS攻击
收稿时间:2012-06-07
修稿时间:2012-07-26

Vulnerability of the Border Router BGP Protocol
PANG Ling. Vulnerability of the Border Router BGP Protocol[J]. Computer Systems& Applications, 2013, 22(1): 157-161
Authors:PANG Ling
Affiliation:Computer Department, Sichuan Administration Institute, Chengdu 610072, China
Abstract:This paper has deeply studied the vulnerability of the BGP protocol running in the backbone routers, laid special stress on analysing the CXPST Attacks algorithm, and introduced the improved shock path selection strategies, theoretically proved that the improved shock path selected strategy better. Experimental tests show that the BGP protocol attacked with the designed algorithm is more effective than that of CXPST algorithm, which can result in the backbone routers running with BGP dropping down in less time.
Keywords:BGP protocol  vulnerability  routers  CXPST  DDoS attack
本文献已被 CNKI 等数据库收录!
点击此处可从《计算机系统应用》浏览原始摘要信息
点击此处可从《计算机系统应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号