摘要
BGP是域间路由协议事实上的标准,分析BGP的行为,尤其是在网络异常情况下的行为,非常重要。文章分析了发生在2001年9月的CodeRed/Nimda蠕虫攻击情况下的BGP行为。结果显示,攻击期间,监测点的BGP更新消息数是正常情况下的30倍。其中的40%是由于监测点自身的环境造成的。通过对消息进行分类的方法,我们更好地分析出了真正导致路由变化的更新消息。
BGP is the de-facto inter-domain routing protocol, and it is essential to understand how well BGP performs in the Internet,especially under stress.In this paper, we examin BGP's behavior during one stressful period, the Code Red/Nimda attack on September, 2001. The attack was correlated with a 30-fold increase in the BGP update messages at a monitoring point. Over 40% of the updates can be attributed to the monitoring artifact in current BGP measurement settings. To better understand the BGP behavior during the attack,we classify all the BGP updates into classes.
出处
《微电子学与计算机》
CSCD
北大核心
2005年第12期127-130,共4页
Microelectronics & Computer