[1] |
REKHTER Y , LI T , HARES S . A border gateway protocol 4(BGP-4)[S]. Internet Engineering Task Force (IETF) RFC 4271, 2006.
|
[2] |
王娜, 杜学绘, 王文娟 ,等. 边界网关协议安全研究综述[J]. 计算机学报, 2017,40(7): 1626-1648.
|
|
WANG N , DU X H , WANG W J ,et al. A survey of the border gateway protocol security[J. Chinese Journal of Computers, 2017,40(7): 1626-1648.
|
[3] |
HUDAIB A A Z , HUDAIB E A Z . DNS advanced attacks and analysis[J]. International Journal of Computer Science and Security (IJCSS), 2014,8(2): 63.
|
[4] |
MIRKOVIC J , REIHER P . A taxonomy of DDoS attack and DDoS defense mechanisms[J]. ACM SIGCOMM Computer Communication Review, 2004,34(2): 39-53.
|
[5] |
CONTI M , DRAGONI N , LESYK V . A survey of man in the middle attacks[J]. IEEE Communications Surveys & Tutorials, 2016,18(3): 2027-2051.
|
[6] |
HUSTON G , MICHAELSON G . Validation of route origination using the resource certificate public key infrastructure (PKI) and route origin authorizations (ROAs)[S]. Internet Engineering Task Force (IETF) RFC 6483, 2012.
|
[7] |
KENT S , LYNN C , SEO K . Secure border gateway protocol (S-BGP)[C]// Proceedings of IEEE Journal on Selected Areas in Communications. Piscataway:IEEE Press, 2002: 582-592.
|
[8] |
WHITE R . Architecture and deployment considerations for secure origin BGP (soBGP)[R]. 2006.
|
[9] |
WHITE R . Securing BGP through secure origin BGP (soBGP)[J]. Business Communications Review, 2003,33(5): 47.
|
[10] |
LEPINSKI M , SRIRAM K . BGPsec protocol specification[S]. Internet Engineering Task Force (IETF) RFC 8205, 2017.
|
[11] |
LYCHEV R , GOLDBERG S , SCHAPIRA M . BGP security in partial deployment[J]. ACM SIGCOMM Computer Communication Review, 2013,43(4): 171-182.
|
[12] |
CHUNG T , ABEN E , BRUIJNZEELS T ,et al. RPKI is coming of age:a longitudinal study of RPKI deployment and invalid route origins[C]// Proceedings of the Internet Measurement Conference. New York:ACM Press, 2019: 406-419.
|
[13] |
GILAD Y , COHEN A , HERZBERG A ,et al. Are we there yet? on RPKI’s deployment and security[C]// Proceedings of 2017 Network and Distributed System Security Symposium. Reston:Internet Society, 2017: 1-16.
|
[14] |
BATTISTA G D , REFICE T , RIMONDINI M . How to extract BGP peering information from the Internet routing registry[C]// Proceedings of the 2006 SIGCOMM Workshop on Mining Network Data. New York:ACM Press, 2006: 317-322.
|
[15] |
GOODELL G , AIELLO W , GRIFFIN T ,et al. Working around BGP:an incremental approach to improving security and accuracy in interdomain routing[C]// Proceedings of the Network and Distributed System Security Symposium. Saarland:DBLP, 2003: 1-11.
|
[16] |
MITSEVA A , PANCHENKO A , ENGEL T . The state of affairs in BGP security:a survey of attacks and defenses[J]. Computer Communications, 2018,124: 45-60.
|
[17] |
刘湘辉, 殷建平, 唐乐乐 ,等. 网络流量的有效测量方法分析[J]. 软件学报, 2003,14(2): 300-304.
|
|
LIU X H , YIN J P , TANG L L ,et al. Analysis of efficient monitoring method for the network flow[J. Journal of Software, 2003,14(2): 300-304.
|
[18] |
WANG N , WANG B Q . A reputation-based method to secure inter-domain routing[C]// Proceedings of 2013 IEEE 10th International Conference on High Performance Computing and Communications &2013 IEEE International Conference on Embedded and Ubiquitous Computing. Piscataway:IEEE Press, 2014: 1424-1429.
|
[19] |
HU N , ZHU P D , ZOU P . Reputation mechanism for inter-domain routing security management[C]// Proceedings of 2009 Ninth IEEE International Conference on Computer and Information Technology. Piscataway:IEEE Press, 2009: 98-103.
|
[20] |
LEE J Y , OH J C . Applications of social media and social network analysis[M]. Germany: Springer International Publishing, 2015.
|
[21] |
NU X , WEI L , YOU L ,et al. A trust model for the inter-domain routing system[J]. Journal of Computer Research and Development, 2016,53(4): 845.
|
[22] |
陈迪, 邱菡, 祝凯捷 ,等. 基于自治域协同的域间路由信誉模型[J]. 中国科学(信息科学), 2021,51(9): 1540-1558.
|
|
CHEN D , QIU H , ZHU K J ,et al. An inter-domain routing reputation model based on autonomous domain collaboration[J. Scientia Sinica (Informationis), 2021,51(9): 1540-1558.
|
[23] |
KONTE M , PERDISCI R , FEAMSTER N . ASwatch:an AS reputation system to expose bulletproof hosting ASes[C]// Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication. New York:ACM Press, 2015: 625-638.
|
[24] |
FILSFILS C , MICHIELSEN K , TALAULIKAR K . Segment routing详解 (第一卷)[M]. 苏远超,蒋治春,译. 北京: 人民邮电出版社, 2017.
|
|
FILSFILS C , MICHIELSEN K , TALAULIKAR K . Segment routing part I[M. Translated by SU Y C,JIANG Z C. Beijing: Posts & Telecom Press, 2017.
|