期刊文献+

面向可信互联网的IP地址管理技术研究 被引量:8

Survey on technologies of IP address management for trustworthy Internet
在线阅读 下载PDF
导出
摘要 作为互联网最重要的基础资源,IP地址与互联网安全可信有着广泛的联系,包含IP地址分配、IP地址配置以及源地址验证等环节在内的IP地址管理工作的研究,是构建可信互联网环境的关键。在构建可信互联网的价值观下,探讨IP地址管理层面的研究内容,梳理近年来IP地址管理范畴内的研究热点以及相关问题的由来,分析相关的技术方案,并就未来的研究方向进行展望。 As the most fundamental resource, IP address has an extensive connection with the trust issue of the Internet. IP address management, including IP address allocation, IP address configuration, source IP address validation and So on, is the key to the establishment of trustworthy Internet. With the establishment of trustworthy Internet as the target, this paper analyzed the origins of different IP address management issues, summarized and evaluated the corresponding countermeasures in history, and envisaged the future research work falling into the category of IP address management.
出处 《计算机应用研究》 CSCD 北大核心 2012年第3期801-807,共7页 Application Research of Computers
基金 国家发展与改革委员会中国下一代互联网示范工程项目(CNGI-09-03-04) 国家自然科学基金青年科学基金资助项目(61003239)
关键词 可信互联网 IP地址管理 IP地址分配 IP地址配置 源地址验证 互联网审计 trustworthy Internet IP address management IP address allocation IP address assignment source address validation Internet accountabihty
  • 相关文献

参考文献47

  • 1林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:252
  • 2REKHTER Y, MOSKOWITZ B, KARRENBERG D, et al. RFC 1918, Address allocation for private Internets [ S ]. Fremont: IETF, 1996.
  • 3HINDEN R, HABERMAN B. RFC 4193, Unique local IPv6 unicast addresses [ S]. Fremont :IETF, 2005.
  • 4REKHTER Y, LI T, HARES S. RFC 4271, A border gateway proto- col 4 (BGP-4) [ S]. Fremont : IETF, 2006.
  • 5MURPHY S. RFC 4272, BGP security vulnerabilities analysis [ S ]. Fremont : IETF ,2006.
  • 6KENT S, LYNN C, MIKKELSON J, et al. Secure border gateway protocol (S-BGP) : real world performance and deployment issues [ C ]//Proc of the 7th Annual Symposium on Network and Distributed System Security. [ S. l. ] : The Internet Society, 2000 : 1-14.
  • 7WHITE R. Securing BGP through secure origin BGP(SOBGP) [ J]. Business Communications Review,2003,33(5 ) : 15-22.
  • 8BATES T, BUSH R, LI T, et al. Draft-bates-bglM-nlri-orig-verif-00, DNS-based NLRI origin AS verification in BGP [ R ]. Fremont :IETF,1998.
  • 9YANG Xiao-wei, LIU Xin. Interent protocol made accountable [C]//Proc of the 8th ACM SIGCOMM Workshop on Hot Topics in Network. 2009.
  • 10HUSTON G, MICHAELSON G, KENT S. Resource certification:a public key infrastructure for IP addresses and AS' s [ C ]//Proc of IEEE GLOBECOM Workshops. Washington DC : IEEE Computer Soci- ety, 2009 : 1 - 6.

二级参考文献17

  • 1林闯,任丰原.可控可信可扩展的新一代互联网[J].软件学报,2004,15(12):1815-1821. 被引量:79
  • 2.中国互联网发展状况统计[EB/OL].http://www.cnnic.net.cn,.
  • 3Algridas A., Laprie J.C., Brian R., Carl L.. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 11~33
  • 4Nicol D.M., Sanders W.H., Trivedi K.S.. Model-based evaluation: From dependability to security. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 48~65
  • 5Paulson L.D.. Stopping intruders outside the gates. IEEE Computer, 2002, 35(11): 20~22
  • 6International Standards Organization. Information Processing Systems-OSIRM. Part2: Security Architecture, ISO/TC 97 7498-2, 1998
  • 7Vaidya N.H.. A case for two-level recovery schemes. IEEE Transactions on Computers, 1998, 47(6): 656
  • 8Avizienis A.. Design of fault-tolerant computers. In: Proceedings of AFIPS Conference, 1967, 31: 733~743
  • 9Michael Atighetchi, Partha Pal et al.. Adaptive cyberdefense for survival and intrusion tolerance. IEEE Internet Computing, 2004, 8(6): 25~33
  • 10Anderson R.J.. Cryptography and competition policy -issues with trusted computing. In: Proceedings of the PODC'03, Boston, Massachusetts, 2003, 13~16

共引文献251

同被引文献39

引证文献8

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部