[1] |
MURPHY S . BGP security vulnerabilities analysis[EB/OL]. .
|
[2] |
NORDSTR?M O , DOVROLIS C . Beware of BGP attacks[J]. ACM Sigcomm Computer Communication Review, 2004, 34(2): 1-8.
|
[3] |
PHOKEER A . Interdomain routing security:motivation and chal-lenges of RPKI[J]. Timss Technical Report, 2013.
|
[4] |
刘欣, 刘华富 . 互联网前缀劫持攻击研究[J]. 计算机技术与发展, 2015(2): 131-134.
|
|
LIU X , LIU H F . Internet prefix hijack attack research[J]. Computer Technology and Development, 2015(2): 131-134.
|
[5] |
HUSTON G , BUSS R . Securing BGP with BGPsec[J]. Internet Society Org. 2011, 6(5): 15-22.
|
[6] |
Secure BGP project (S-BGP) [EB/OL]. .
|
[7] |
WHITE R . Securing BGP through secure origin BGP (SoBGP)[J]. The Internet Protocol Journal. 2003, 6(3): 15-22.
|
[8] |
LEPINSKI M , KENT S . An infrastructure to support secure Inter-net routing[EB/OL]. .
|
[9] |
LEPINSKI M , SRIRAM K . BGpsec protocol specification[EB/OL]. .
|
[10] |
REKHTER Y , LI T , HARES S . A border gateway protocol 4(BGP-4)[S]. RFC 4271, 2006.
|
[11] |
CHEN E . Route refresh capability for BGP-4[S]. RFC 2918, 2000.
|
[12] |
黎松, 诸葛建伟, 李星 . BGP安全研究[J]. 软件学报, 2013, 24(1): 121-138.
|
|
LI S , ZHU-GE J W , LI X . BGP security studies[J]. Journal of Soft-ware, 2013, 24(1): 121-138.
|
[13] |
GAO L . On inferring autonomous system relationships in the Internet[J]. IEEE/ACM Transation on Networking, 2001, 9(6): 733-745.
|
[14] |
HUSTON G . Leaking routes-the ISP Column 2012[EB/OL]. .
|
[15] |
Finding and diagnosing BGP route leaks[EB/OL]. .
|
[16] |
BGP routing leak detection system routing leak detection sys-tem[EB/OL]. .
|
[17] |
SRIRAM K , MONTGOMERY D , MCPHERSON D , et al. Problem definition and classification of bgp route leaks[S]. RFC 7908, 2016.
|
[18] |
DURAND J , PEPELNJAK I , DOERING G . BGP operations and security[S]. RFC 7454, 2015.
|
[19] |
KUHN R , SRIRAM K , MONTGOMERY D . Border gateway proto-col security[EB/OL] .
|
[20] |
IANA. Special-use IPv4 addresses.RFC 3330[EB/OL]. .
|
[21] |
PATEL K , HARES S . Analysis of Existing work for I2NSF[EB/OL]. .
|
[22] |
Overview of the IRR[EB/OL]. .
|
[23] |
ALAETTINOGLU C , VILLAMIZAR C , GERICH E , et al. Routing policy specification language(RPSL)[S]. RFC 2622.
|
[24] |
BLUNK L , DAMAS J , PARENT F , et al. Routing policy specifica-tion language next generation(RPSLng)[S]. RFC 4012.
|
[25] |
Secure inter-domain routing (sidr)[EB/OL]. .
|
[26] |
SRIRAM K , MONTGOMERY D , DICKSON B , et al. Method for detection and mitigation of BGP route leaks[EB/OL]. .
|
[27] |
HUSTON G , MICHAELSON G . Validation of route origination using the resource certification public key infrastructure(PKI) and route origin authorization (ROAs)[S]. RFC 6483.
|
[28] |
AZIMOV A , BOGOMAZOV E , BUSH R . Route leak detection and filtering using roles in update and open messages[EB/OL]. .
|