Computer Science ›› 2014, Vol. 41 ›› Issue (Z6): 357-360.

Previous Articles     Next Articles

Decision for Autonomous System Maliciousness Based on Quantitative Trust Measurement

WANG Yu,WANG Zhen-xing,ZHANG Lian-cheng,GUO Yi and KONG Ya-zhou   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Decision for Autonomous System maliciousness has not been effectively resolved within the current inter-domain routing system.On the basis of the research on trust relationship via the human society networks,a model of decision for the Autonomous System maliciousness based on the quantitative trust measurement is proposed.Three criteria including direct decision,collaborative decision and degree of coordination are defined,on which the comprehensive analysis and quantization towards the interactive routing behaviors of target Autonomous System,and the degree of participation is also defined as the amplifying factor.Experiments based on simulation topology is launched and the result indicates that,under the typical circumstances of routes spoofing,services restriction and intended incorrect decision by collaborative Autonomous System,the model can effectively discriminate and make reasonable decisions to the target malicious behavior,with good accuracy and stability.

Key words: Inter-domain routing system,Autonomous system,Quantitative trust measurement,Maliciousness decision

[1] Butler K T,Farley R,McDaniel P,et al.A survey of BGP security issues and solutions[J].Proceedings of the IEEE,2010,98(1):100-122
[2] 王娜,智英建,张建辉,等.一个基于身份的安全域间路由协议[J].软件学报,2009,20(12):3223-3239
[3] Oorschot P C,Wan T,Kranakis E.On interdomain routing security and pretty secure BGP (psBGP)[J].ACM Transactions on Information and System Security (TISSEC),2007,10(3):11-25
[4] 胡乔林,孙一品,苏金树.BAR-BGP:基于备份通告和恢复转发的可靠域间路由[J].计算机研究与发展,2011,48(12):2242-2252
[5] Lad M,Massey D,Pei D,et al.PHAS:a prefix hijack alert system[C]∥Proceedings of the 15th USENIX Security Symposium.Vancouver,Canada,2006:108-119
[6] Schapira M,Zhu Y,Rexford J.Putting BGP on the right path:A case for next-hop routing[C]∥Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks.Monterey,CA,USA,2010:1-6
[7] RIPE.Ripe’s MyASN[EB/OL].http://www.ris.ripe.net /myasn.html,2011-05-01/2013-04-22
[8] 刘欣,王小强,朱培栋,等.互联网域间路由系统安全态势评估[J].计算机研究与发展,2009,46(10):1669-1677
[9] 郭毅,王振兴,程东年.基于博弈的域间路由协同监测激励策略[J].中国科学,2012,42(7):803-814
[10] Shen Y,Bi J,Wu J P,et al.A two-level source address spoofing prevention based on automatic signature and verification mechanism[C]∥Proceedings of the IEEE symposium on computers and communications.Tarrytown,NY,USA,2008:392-397
[11] Ning H,Peidong Z,Peng Z.Reputation Mechanism for Inter-domain Routing Security Management[C]∥Proceedings of the 9th International Conference on Computer and Information Techno-logy.Xiamen,China,2009:98-103
[12] 李峰,申利民,司亚利,等.一种基于实体上下文和时间戳的信任预测模型[J].电子与信息学报,2011,33(5):1217-1223

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!