期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Building a next generation Internet with source address validation architecture 被引量:8
1
作者 WU JianPing1,3,REN Gang1,3 & LI Xing2,3 1 Department of Computer Science,Tsinghua University,Beijing 100084,China 2 Department of Electronic Engineering,Tsinghua University,Beijing 100084,China 3 Tsinghua National Laboratory for Information Science and Technology(TNList) ,Beijing 100084,China 《Science in China(Series F)》 2008年第11期1681-1691,共11页
The IP packet forwarding of current Internet is mainly destination based. In the forwarding process, the source IP address is not checked in most cases.This causes serious security, management and accounting problems.... The IP packet forwarding of current Internet is mainly destination based. In the forwarding process, the source IP address is not checked in most cases.This causes serious security, management and accounting problems. Based on the drastically increased IPv6 address space, a "source address validation architecture" (SAVA) is proposed in this paper, which can guarantee that every packet received and forwarded holds an authenticated source IP address. The design goals of the architecture are lightweight, loose coupling, "multi-fence support" and incremental deployment. This paper discusses the design and implementation for the architecture, including inter-AS, intra-AS and local subnet. The performance and scalability of SAVA are described. This architecture is deployed into the CNGI-CERNET2 infrastructure a large-scale native IPv6 backbone network of the China Next Generation Internet project. We believe that the SAVA will help the transition to a new, more secure and dependable Internet. 展开更多
关键词 IP source address validation network architecture network security
原文传递
RISP: An RPKI-Based Inter-AS Source Protection Mechanism 被引量:3
2
作者 Yihao Jia Ying Liu +1 位作者 Gang Ren Lin He 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2018年第1期1-12,共12页
IP source address spoofing is regarded as one of the most prevalent components when launching an anonymous invasion, especially a Distributed Denial-of-Service (DDoS) attack. Although Source Address Validations (S... IP source address spoofing is regarded as one of the most prevalent components when launching an anonymous invasion, especially a Distributed Denial-of-Service (DDoS) attack. Although Source Address Validations (SAVs) at the access network level are standardized by the Internet Engineering Task Force (iETF), SAV at the inter-Autonomous System (AS) level still remains an important issue. To prevent routing hijacking, the IETF is constructing a Resource Public Key Infrastructure (RPKI) as a united trust anchor to secure interdomain routing, in this study, we creatively use the RPKI to support inter-AS SAV and propose an RPKI-based Inter-AS Source Protection (RISP) mechanism. According to the trust basis provided by the RPKI, RISP offers ASes a more credible source-oriented protection for the IP addresses they own and remains independent of the RPKI. Based on the experiments with real Internet topology, RISP not only provides better incentives, but also improves efficacy and economizes bandwidth with a modest resource consumption. 展开更多
关键词 IP spoofing source address validation inter-AS RPKI DDOS
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部