Computer Science ›› 2014, Vol. 41 ›› Issue (Z6): 357-360.
Previous Articles Next Articles
WANG Yu,WANG Zhen-xing,ZHANG Lian-cheng,GUO Yi and KONG Ya-zhou
[1] Butler K T,Farley R,McDaniel P,et al.A survey of BGP security issues and solutions[J].Proceedings of the IEEE,2010,98(1):100-122 [2] 王娜,智英建,张建辉,等.一个基于身份的安全域间路由协议[J].软件学报,2009,20(12):3223-3239 [3] Oorschot P C,Wan T,Kranakis E.On interdomain routing security and pretty secure BGP (psBGP)[J].ACM Transactions on Information and System Security (TISSEC),2007,10(3):11-25 [4] 胡乔林,孙一品,苏金树.BAR-BGP:基于备份通告和恢复转发的可靠域间路由[J].计算机研究与发展,2011,48(12):2242-2252 [5] Lad M,Massey D,Pei D,et al.PHAS:a prefix hijack alert system[C]∥Proceedings of the 15th USENIX Security Symposium.Vancouver,Canada,2006:108-119 [6] Schapira M,Zhu Y,Rexford J.Putting BGP on the right path:A case for next-hop routing[C]∥Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks.Monterey,CA,USA,2010:1-6 [7] RIPE.Ripe’s MyASN[EB/OL].http://www.ris.ripe.net /myasn.html,2011-05-01/2013-04-22 [8] 刘欣,王小强,朱培栋,等.互联网域间路由系统安全态势评估[J].计算机研究与发展,2009,46(10):1669-1677 [9] 郭毅,王振兴,程东年.基于博弈的域间路由协同监测激励策略[J].中国科学,2012,42(7):803-814 [10] Shen Y,Bi J,Wu J P,et al.A two-level source address spoofing prevention based on automatic signature and verification mechanism[C]∥Proceedings of the IEEE symposium on computers and communications.Tarrytown,NY,USA,2008:392-397 [11] Ning H,Peidong Z,Peng Z.Reputation Mechanism for Inter-domain Routing Security Management[C]∥Proceedings of the 9th International Conference on Computer and Information Techno-logy.Xiamen,China,2009:98-103 [12] 李峰,申利民,司亚利,等.一种基于实体上下文和时间戳的信任预测模型[J].电子与信息学报,2011,33(5):1217-1223 |
No related articles found! |
|