期刊文献+
共找到21,014篇文章
< 1 2 250 >
每页显示 20 50 100
AI融合BGP与M-LAG的互联网专线全链路数智化安全防护技术研究及应用
1
作者 张龙江 张昕原 梁凌 《山东通信技术》 2025年第4期20-24,共5页
为契合下一代互联网的高可靠、高智能与高质量发展趋势,针对行业客户互联网专线在安全防护、负载分担、容灾恢复等方面的痛点,提出以运营商侧BGP路由技术与客户侧M-LAG容灾技术为核心架构,融合AI智能体与数字孪生试验技术,构建IPv6/IPv... 为契合下一代互联网的高可靠、高智能与高质量发展趋势,针对行业客户互联网专线在安全防护、负载分担、容灾恢复等方面的痛点,提出以运营商侧BGP路由技术与客户侧M-LAG容灾技术为核心架构,融合AI智能体与数字孪生试验技术,构建IPv6/IPv4互联网专线全链条数智化安全防护体系,实现互联网专线负载分担优化、容灾能力增强、故障恢复加速的质量提升,进一步强化网络韧性与业务连续性。 展开更多
关键词 AI bgp M-LAG 数字孪生 互联网专线
在线阅读 下载PDF
Practical Security Approaches against Border Gateway Protocol (BGP) Session Hijacking Attacks between Autonomous Systems 被引量:1
2
作者 Stephen Brako Oti James Ben Hayfron-Acquah 《Journal of Computer and Communications》 2014年第8期10-21,共12页
The border gateway protocol (BGP) is the default inter domain routing protocol used on the internet for exchanging information between autonomous systems. Available literature suggests that BGP is vulnerable to sessio... The border gateway protocol (BGP) is the default inter domain routing protocol used on the internet for exchanging information between autonomous systems. Available literature suggests that BGP is vulnerable to session hijacking attacks. There are a number of proposals aimed at improving BGP security which have not been fully implemented. This paper examines a number of approaches for securing BGP through a comparative study and identifies the reasons why these proposals have not been implemented commercially. This paper analyses the architecture of internet routing and the design of BGP while focusing on the problem of BGP session hijacking attacks. Using Graphical Network Simulator 3 (GNS-3), a session hijack is demonstrated and a solution which involves the implementation of route filtering, policy-maps and route-maps on CISCO routers representing ASes is carried out. In the end, a workable industry standard framework for securing and protecting BGP sessions and border routers from exploitation with little or no modification to the existing routing infrastructure is demonstrated. 展开更多
关键词 Inter-Domain ROUTING SESSION HIJACKING bgp SECURITY Autonomous Systems
在线阅读 下载PDF
轻量级域间BGP路由安全网络方案研究
3
作者 熊礼霞 陈燕 +1 位作者 郜均翔 张旭 《邮电设计技术》 2025年第10期71-75,共5页
首先阐述网络安全技术及域间BGP路由安全的发展现状,分析了现有防护方案(如业界BGPsec方案[1])的核心问题——部署难度高、对现网设备改造要求高。提出了一种轻量级域间BGP路由安全网络方案,从协议扩展设计与业务处理流程2个方面,详细... 首先阐述网络安全技术及域间BGP路由安全的发展现状,分析了现有防护方案(如业界BGPsec方案[1])的核心问题——部署难度高、对现网设备改造要求高。提出了一种轻量级域间BGP路由安全网络方案,从协议扩展设计与业务处理流程2个方面,详细阐述了方案的总体思路、技术细节、应用场景及应用价值。旨在通过该轻量级方案,降低域间BGP路由安全防护的部署复杂度与现网改造成本,为域间路由安全防护提供可行路径。 展开更多
关键词 轻量级bgp安全 域间bgp bgp安全
在线阅读 下载PDF
BGP异常事件影响风险区域快速识别方法
4
作者 刘自勉 邱菡 +2 位作者 王瑞 朱俊虎 王清贤 《信息安全学报》 2025年第2期103-115,共13页
域间路由网络是互联网的关键基础设施。由于域间路由网络的自适应机制,中断、攻击等BGP异常事件往往会引起级联效应,对网络正常运行带来巨大危害。面向异常响应的及时性需求,基于实时监测数据的BGP异常检测溯源方式存在滞后性,难以及时... 域间路由网络是互联网的关键基础设施。由于域间路由网络的自适应机制,中断、攻击等BGP异常事件往往会引起级联效应,对网络正常运行带来巨大危害。面向异常响应的及时性需求,基于实时监测数据的BGP异常检测溯源方式存在滞后性,难以及时阻断异常传播。在事件初期识别可能受影响的风险区域可以在异常扩散前提供告警信息,支持提前进行有针对性的防护,降低异常的影响。然而现有识别影响风险区域的方法通常基于级联失效模型模拟异常传播过程,难以权衡识别准确率和识别速度。为此,提出一种BGP异常事件影响风险区域快速识别方法 RRAI以适应大规模域间路由网络的需求。通过分析域间路由网络级联失效过程中节点和边的失效机制及相互作用原理,定义节点“风险度”用于识别易受当前异常区域影响的节点;针对初始异常节点位置分布的两类情况:集中式和分散式分布,分别提出针对单区域异常和多区域异常的风险区域识别算法,以初始异常区域为中心进行迭代式扩展,层层筛选风险较高的节点加入风险区域。考虑到现有方法的高复杂度,在小规模网络上与现有方法进行对比,实验结果表明, RRAI能在准确率提升的同时显著缩短运行时间。基于全球网络上的真实异常事件的实验结果表明, RRAI能够在10分钟以内有效预测所有受损程度高的节点,实现在大规模域间路由网络中快速识别风险区域。 展开更多
关键词 域间路由安全 bgp异常事件 级联失效 风险区域识别
在线阅读 下载PDF
The impact of EU carbon border adjustment mechanism on China’s export and its countermeasures 被引量:1
5
作者 Libing Wang Ya Wen Yun Zhang 《Global Energy Interconnection》 2025年第2期205-212,共8页
This study analyzes the potential impact of EU carbon border regulation mechanism(CBAM)on the export of China’s carbon-intensive products.First,we summarized the main content of the CBAM.Next,based on the input-outpu... This study analyzes the potential impact of EU carbon border regulation mechanism(CBAM)on the export of China’s carbon-intensive products.First,we summarized the main content of the CBAM.Next,based on the input-output theory,this study proposes a calculation model for the implicit carbon emissions and indirect carbon emissions from electricity consumption in export products and presents the corresponding calculation results.Based on the scenario analysis method,six carbon tariffscenarios were designed to evaluate the impact of the CBAM on the major export sectors under each scenario.The results showed that in 2021,the implicit carbon emissions in all products exported to Europe from China were approximately 375 million tons,of which the indirect carbon emissions from electricity were approximately 41.8 million tons,accounting for more than 10%.According to the current levy plan,China is expected to be subject to carbon tariffs of approximately USD 1.4 billion,accounting for 0.3%of its total export value to Europe in 2021.Finally,to reduce the adverse effects of CBAM,four measures were proposed from the perspective of the power industry. 展开更多
关键词 Implicit carbon emissions Carbon border regulation mechanism Indirect carbon emissions from electricity Green electricity trade
在线阅读 下载PDF
基于VxLAN+BGP实现制造业的工业网络升级改造方案研究
6
作者 向光晖 王小瑞 +1 位作者 曲木车博 汪剑东 《价值工程》 2025年第36期1-3,共3页
随着智能制造的快速发展,传统工业网络已难以满足现代制造业对灵活性、可扩展性和安全性的组网需求。本文针对制造业中普遍存在的数据孤岛问题、多样化业务场景网络需求及网络扩展性限制,提出了一种基于VxLAN与BGP相结合的工业网络升级... 随着智能制造的快速发展,传统工业网络已难以满足现代制造业对灵活性、可扩展性和安全性的组网需求。本文针对制造业中普遍存在的数据孤岛问题、多样化业务场景网络需求及网络扩展性限制,提出了一种基于VxLAN与BGP相结合的工业网络升级改造方案。该方案利用SDN的集中控制特性,结合VxLAN的Overlay虚拟化网络技术和BGP-EVPN的控制平面机制,实现了网络资源的灵活调配和多业务组网及隔离。通过在制造业网络环境中部署验证,本文所提出的方案显著提升了网络资源的利用率,能够充分满足灵活多变的业务场景需求,同时降低了运维的复杂度,为制造业的数字化转型提供了有效的网络支撑。 展开更多
关键词 VxLAN bgp 智能制造
在线阅读 下载PDF
The Legal Framework of Borders: A Critical Analysis of the Continuity and Change in Border Laws From the Colonial to the Post-Colonial Era in India
7
作者 Shailen Verma 《International Relations and Diplomacy》 2025年第3期134-141,共8页
This article examines the evolution of India’s border laws from colonial to post-colonial periods,analyzing the continuities and transformations in legal frameworks governing territorial boundaries.Through historical... This article examines the evolution of India’s border laws from colonial to post-colonial periods,analyzing the continuities and transformations in legal frameworks governing territorial boundaries.Through historical-legal analysis of key legislation,policies,and judicial interpretations,the research demonstrates how colonial border regulations-primarily designed for imperial control-have been selectively preserved,modified,or replaced to serve post-independence imperatives.Findings reveal that 62%of colonial border management mechanisms persisted verbatim in post-colonial legislation,while regional variations created overlapping“legal border zones”with differential adaptation rates.The study identifies a significant shift from administrative boundaries toward securitized frontiers,with a 217%increase in religious and ethnic identifiers in post-1947 border legislation.This legal evolution reflects broader tensions between decolonization aspirations and inherited governance structures,creating what Cons(2016)terms“sensitive spaces”where exceptional legal regimes continue to operate.The research contributes to understanding how post-colonial states navigate the paradox of maintaining sovereignty through legal instruments originally designed for imperial control,with implications for borderland populations who experience persistent“legal liminality”despite constitutional protections. 展开更多
关键词 border laws post-colonial legal theory INDIA partition SECURITIZATION legal transplantation citizenship critical border studies historical institutionalism SOVEREIGNTY
在线阅读 下载PDF
Research on the Model and Pathways for Border Tourism Development and Poverty Alleviation in Ethnic Regions——A Case Study of the Northwest Yunnan Region
8
作者 Baige Jiang Qichao Zhang +1 位作者 Weiyi Zhou Kai Li 《Proceedings of Business and Economic Studies》 2025年第4期299-304,共6页
Against the backdrop of globalization and regional economic integration,border tourism,as a unique form of tourism,is increasingly emerging as a significant driving force for promoting economic development in border r... Against the backdrop of globalization and regional economic integration,border tourism,as a unique form of tourism,is increasingly emerging as a significant driving force for promoting economic development in border regions,fostering cultural exchange,and strengthening international cooperation.The northwestern Yunnan region,located in China’s Southwestern frontier,is a key area bordering Southeast and South Asian countries,endowed with abundant border tourism resources.This article delves into the border tourism models and pathways for border development and prosperity in ethnic regions,using a case study of the Northwest Yunnan region to analyze the mechanisms and influencing factors of border tourism in promoting local economic development,social progress,and cultural heritage.This provides empirical evidence for further understanding the development patterns of border tourism and also contributes to strengthening ethnic unity and maintaining harmony and stability in border regions.This study addresses the current research gap in exploring the development models and pathways of border tourism in specific regions,offering valuable references and insights for future related research. 展开更多
关键词 border tourism border prosperity and people’s well-being ethnic regions Models and pathways
在线阅读 下载PDF
Science knows no borders:Memories of Professor Rong-Sheng Zeng,a pioneering figure of modern geophysics in China
9
作者 Wang-Ping Chen 《Earthquake Science》 2025年第5期461-464,共4页
Preface Here I document some personal memories of Professor Rong-Sheng Zeng,particularly how he had long-lasting influences on the work of my research groups in the USA and in China.The narrative directly crosses poli... Preface Here I document some personal memories of Professor Rong-Sheng Zeng,particularly how he had long-lasting influences on the work of my research groups in the USA and in China.The narrative directly crosses political boundaries,including those of the USA and China.Indirectly,it also involves collaboration of researchers and institutions from Türkiye,Germany,France,Nepal,Russia,the Solomon Islands,and New Caledonia.Collectively,my narrative demonstrates the far-reaching,“butterfly effect”of a dedicated,kind geophysicist in China. 展开更多
关键词 borders GEOPHYSICS rong sheng zeng usa PROFESSOR SCIENCE research researchers institutions
在线阅读 下载PDF
Exploration of Teaching Practice on Empowering the Consciousness of the Chinese National Community with Ethnic Music in Universities in Border Areas
10
作者 Yi Feng Decai Wang Zhijian Li 《Journal of Contemporary Educational Research》 2025年第5期301-308,共8页
Against the strategic backdrop of forging and strengthening the consciousness of the Chinese national community in the new era,universities in border areas,as crucial platforms for the integration of multi-ethnic cult... Against the strategic backdrop of forging and strengthening the consciousness of the Chinese national community in the new era,universities in border areas,as crucial platforms for the integration of multi-ethnic cultures,shoulder the significant mission of enhancing ethnic unity and promoting outstanding traditional Chinese culture.As an important carrier of Chinese culture,ethnic music not only contains profound historical memories and emotional identities but also demonstrates a powerful cultural and educational function in the teaching of border universities.Based on the actual situation of universities in border areas,this paper analyzes the unique value of ethnic music in cultivating students’national identity,cultural identity,and emotional identity,and explores effective paths for it to empower the forging and strengthening of the consciousness of the Chinese national community in teaching practice.By combining policy orientations and teaching status quo,the paper points out the main dilemmas such as single curriculum content,insufficient integration of ideological and political education,and a lack of practical resources,and proposes countermeasures such as strengthening the integration of ideological and political education,optimizing the curriculum structure,and expanding practical platforms.Through the deepening and innovation of ethnic music education,border universities can effectively enhance students’cultural consciousness and cultural confidence,providing solid educational support for forging and strengthening the consciousness of the Chinese national community.This paper has positive significance for promoting the high-quality development of education in border universities and constructing a new-era ethnic unity and progress education system. 展开更多
关键词 border universities Ethnic music Consciousness of the Chinese national community Teaching practice Cultural identity
在线阅读 下载PDF
Bridges Beyond Borders The China-Indonesia“Two Countries,Twin Parks”initiative is forging a new model for cross-border industrial cooperation
11
作者 Gao Yuan 《China Report ASEAN》 2025年第5期48-49,共2页
On April 12,a 200-kilogram shipment of fresh coconuts departed from Jakarta,Indonesia,bound for Changle Airport in Fuzhou,southeast China’s Fujian Province.After customs inspection,the coconuts were promptly transpor... On April 12,a 200-kilogram shipment of fresh coconuts departed from Jakarta,Indonesia,bound for Changle Airport in Fuzhou,southeast China’s Fujian Province.After customs inspection,the coconuts were promptly transported to the Yuanhong Investment Zone,the Chinese side of the China-Indonesia“Two Countries,Twin Parks”project. 展开更多
关键词 Cross border Industrial Cooperation Customs Inspection Fresh Coconuts Transport China Indonesia Two Countries Twin Parks Initiative customs inspectionthe
在线阅读 下载PDF
New doors open for cross-border e-commerce
12
作者 Zhong Mengxia 《China Textile》 2025年第3期13-14,共2页
On May 14th,following the U.S.adjustment of additional tariffs on Chinese goods,American buyers began stockpiling in earnest.Many cross-border e-commerce companies also received a surge of orders.At 7 PM,a bustling Ha... On May 14th,following the U.S.adjustment of additional tariffs on Chinese goods,American buyers began stockpiling in earnest.Many cross-border e-commerce companies also received a surge of orders.At 7 PM,a bustling Hangzhou-based cross-border e-commerce company was alive with multiple languages echoing through its live-streaming rooms as backend order numbers climbed steadily. 展开更多
关键词 cross border e commerce order numbers american buyers additional tariffs surge orders live streaming hangzhou based company
在线阅读 下载PDF
Highland Ties Dehong leverages innovative communication approaches to strengthen China-Myanmar friendship and share local stories across the border
13
作者 Zheng Bin 《China Report ASEAN》 2025年第11期56-58,共3页
Along China's southwestern border,Dehong Dai and Jingpo Autonomous Prefecture in Yunnan Province shares mountains,rivers,ethnic ties,and cultural connections with Myanmar.This land,imbued with the spirit of the pa... Along China's southwestern border,Dehong Dai and Jingpo Autonomous Prefecture in Yunnan Province shares mountains,rivers,ethnic ties,and cultural connections with Myanmar.This land,imbued with the spirit of the pauk-phaw friendship(pauk-phaw means fraternal in Myanmar language),has in recent years been exploring innovative approaches to international communication with Myanmar.Centered on serving the Belt and Road Initiative(BRI)and building a China-Myanmar community with a shared future,Dehong has incorporated the vision of“Mingalaba”(auspiciousness in Myanmar language)into its cross-border communication e"orts,sharing stories of China-Myanmar friendship with people far and wide. 展开更多
关键词 belt road initiative bri innovative communication Belt Road Initiative China Myanmar friendship Pauk phaw friendship cross border communication Mingalaba
在线阅读 下载PDF
BGP路由劫持检测与处置探讨
14
作者 张笑颜 杨艳松 +1 位作者 袁姝婕 梁晓晨 《邮电设计技术》 2025年第8期64-68,共5页
随着互联网规模的不断扩大和复杂性的增加,域间路由协议(BGP)作为互联网通信的核心组件,其稳定性和安全性变得尤为重要。基于此,提出了BGP路由劫持检测与处置的设想,通过BGP路由异常检测与处置,提升网络安全和稳定性。
关键词 边界网关协议 域间路由 路由异常 路由安全 实时检测
在线阅读 下载PDF
The cross-border exploration of art
15
作者 李全忠 《疯狂英语(新读写)》 2025年第5期15-17,74,共4页
In our opinion,being associated with the art of painting,these shifts laid the groundwork for the exciting painting art trends coming in 2025.Immersive installations(沉浸式虚拟现实装置).Imagine stepping into a paintin... In our opinion,being associated with the art of painting,these shifts laid the groundwork for the exciting painting art trends coming in 2025.Immersive installations(沉浸式虚拟现实装置).Imagine stepping into a painting that moves,speaks,and reacts to your presence.With virtual reality(VR)and augmented reality(AR),artists are building sensory⁃filled spaces where you're not just a viewer—you're part of the art.Picture entering an exhibit where the walls ripple as you walk by,sounds shift with your movements,and you can alter the piece just by being there.These installations combine technology and creativity to offer unforgettable experiences that redefine art as a shared and living entity. 展开更多
关键词 sensory filled spaces virtual reality vr augmented reality art trends augmented reality ar artists immersive installations cross border exploration virtual reality
在线阅读 下载PDF
SE-BGP:一种BGP安全机制 被引量:20
16
作者 胡湘江 朱培栋 龚正虎 《软件学报》 EI CSCD 北大核心 2008年第1期167-176,共10页
BGP(bordergatewayprotocol)协议的安全是Internet路由系统安全的关键.目前已提出多种BGP安全机制,但都未能得到部署.对BGP安全机制的部署问题进行深入分析,利用AS(autonomous system)结构的Rich-Club特性,提出AS联盟的概念,设计了一种... BGP(bordergatewayprotocol)协议的安全是Internet路由系统安全的关键.目前已提出多种BGP安全机制,但都未能得到部署.对BGP安全机制的部署问题进行深入分析,利用AS(autonomous system)结构的Rich-Club特性,提出AS联盟的概念,设计了一种BGP安全机制:SE-BGP(security enhanced BGP).SE-BGP采用基于AS联盟的安全体系结构,使用一种具有分布式认证中心的新的信任模型——TTM(translato rtrust model).设计了基于TTM模型的认证算法,给出了基于现有BGP协议的扩充实现方法.与已有的安全机制相比,SE-BGP在保证安全能力的同时,所需的证书规模大约为原有机制的1%,具有良好的可扩展性. 展开更多
关键词 bgp 安全 SEbgp AS 联盟 信任模型 TTM
在线阅读 下载PDF
基于前缀分配路径长度的BGP源自治系统验证机制 被引量:7
17
作者 王娜 张建辉 +1 位作者 马海龙 汪斌强 《电子学报》 EI CAS CSCD 北大核心 2009年第10期2220-2227,共8页
发现目前安全性得到广泛认可的BGP源自治系统验证机制(如S-BGP)会受到一种上层ISP(Internet Service Provider,Internet服务提供商)前缀劫持攻击.这些机制基于前缀的分配路径,仅能保证前缀被分配路径上的ISP授权自治系统发起,不能保证... 发现目前安全性得到广泛认可的BGP源自治系统验证机制(如S-BGP)会受到一种上层ISP(Internet Service Provider,Internet服务提供商)前缀劫持攻击.这些机制基于前缀的分配路径,仅能保证前缀被分配路径上的ISP授权自治系统发起,不能保证被分配路径上最后一个ISP(即前缀的拥有ISP)授权自治系统发起.只有获得前缀拥有ISP授权的自治系统才是该前缀的合法源自治系统.本文提出了一种基于前缀分配路径长度的源自治系统验证机制---LAP(the Length of Assignment Path,分配路径长度).基本思想是任一发出前缀可达路由通告的自治系统都必须提供该前缀的分配路径及证明,只有提供前缀最长有效分配路径的自治系统才是该前缀的合法源自治系统.LAP可保护域间路由系统免受有效前缀劫持、子前缀劫持、未使用前缀劫持,特别是上层ISP前缀劫持攻击,可无缝应用于BGP安全方案和一些下一代域间路由协议中. 展开更多
关键词 bgp 安全 前缀劫持
在线阅读 下载PDF
自治系统间的安全路由协议GesBGP 被引量:13
18
作者 李琦 吴建平 +2 位作者 徐明伟 徐恪 张新文 《计算机学报》 EI CSCD 北大核心 2009年第3期506-515,共10页
域间路由协议BGP的安全性直接影响着互联网路由的可用性.虽然现有很多改进的BGP安全方案可以解决这些安全问题,但这类方案存在很多设计缺陷(例如,路由资源消耗问题).在文中,作者充分考虑了安全BGP的目标并提出了一个Good-Enough-Securit... 域间路由协议BGP的安全性直接影响着互联网路由的可用性.虽然现有很多改进的BGP安全方案可以解决这些安全问题,但这类方案存在很多设计缺陷(例如,路由资源消耗问题).在文中,作者充分考虑了安全BGP的目标并提出了一个Good-Enough-Security BGP(GesBGP)协议.GesBGP在可信计算技术的基础上使用基于身份的密钥(IBS)算法确保BGP协议中身份的真实性.IBS算法的引入有效地消除了传统安全BGP协议中部署集中公钥基础设施(PKI)以及公钥证书的分发和储存问题.此外,GesBGP不单纯依赖于安全密钥算法,基于可信计算技术的BGP可信服务从路由器系统本身防止了系统配置的非法篡改,消除了路由消息的多重累积签名.在提出的优化GesBGP协议中,通过部署BGP的安全规则建立AS之间强制信任关系,进一步消除了BGP通告消息中的累积签名.安全分析和性能评价表明,优化的GesBGP在确保BGP安全性的同时有效地改进了GesBGP的性能. 展开更多
关键词 域间路由协议 bgp 安全bgp Gesbgp
在线阅读 下载PDF
基于事件驱动的边界网关协议BGP-4的设计与实现 被引量:5
19
作者 徐恪 吴建平 范晓勃 《软件学报》 EI CSCD 北大核心 2000年第11期1516-1521,共6页
边界网关协议 BGP( border gateway protocol)是 Internet上用于自治系统之间交换路由信息的动态路由协议 .介绍了在清华大学研制的国产高性能路由器中分布式路由协议 BGP- 4的具体实现 .为了实现这一复杂的动态协议 ,提出基于事件驱动... 边界网关协议 BGP( border gateway protocol)是 Internet上用于自治系统之间交换路由信息的动态路由协议 .介绍了在清华大学研制的国产高性能路由器中分布式路由协议 BGP- 4的具体实现 .为了实现这一复杂的动态协议 ,提出基于事件驱动的设计和实现方法 .事件驱动机制能够精确地反映网络报文交换行为的实现机制 ,因而很适合 Internet高层协议的实现 .该方法也可以用于实现其他的 Internet高层协议 . 展开更多
关键词 事件驱动 边界网关协议 bgp-4 INTERNET网
在线阅读 下载PDF
标准模型下可证明安全的BGP路由属性保护机制 被引量:8
20
作者 李道丰 王高才 +2 位作者 王志伟 钟诚 李陶深 《计算机学报》 EI CSCD 北大核心 2015年第4期859-871,共13页
BGP路由协议是目前大多数网络基础设施所采用的重要协议之一.随着网络攻击技术的发展,如何构造安全且容易部署的BGP协议保护机制,仍然是安全路由协议研究中的热点问题.文中提出标准模型下可证明安全的BGP协议的路由属性保护机制——Iden... BGP路由协议是目前大多数网络基础设施所采用的重要协议之一.随着网络攻击技术的发展,如何构造安全且容易部署的BGP协议保护机制,仍然是安全路由协议研究中的热点问题.文中提出标准模型下可证明安全的BGP协议的路由属性保护机制——Identity-based Sanitizable Signature Path Verification(简称IDSPV).IDSPV机制采用基于身份的密码学思想以及可净化签名方案的优点.并结合BGP路由协议特征,在无需证书的条件下,仅需将自己的更新报文签名后再添加到AS_PATH路径中,为BGP路由属性完整性和真实性提供保护.避免证书存储和管理开销.另外,文中给出保护AS_PATH路由属性的安全模型,利用规约技术,在标准模型下给出IDSPV机制的安全证明.通过安全性和性能方面的分析可知,与现有方案相比,IDSPV机制更易于在实际网络中部署. 展开更多
关键词 标准模型 边界网关协议 可证明安全 路由属性保护 可净化签名
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部