Vulnerability of the Border Router BGP Protocol
DOI:
CSTR:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    This paper has deeply studied the vulnerability of the BGP protocol running in the backbone routers, laid special stress on analysing the CXPST Attacks algorithm, and introduced the improved shock path selection strategies, theoretically proved that the improved shock path selected strategy better. Experimental tests show that the BGP protocol attacked with the designed algorithm is more effective than that of CXPST algorithm, which can result in the backbone routers running with BGP dropping down in less time.

    Reference
    Related
    Cited by
Get Citation

庞玲.边界路由器BGP协议的脆弱性.计算机系统应用,2013,22(1):157-161

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:June 07,2012
  • Revised:July 26,2012
  • Adopted:
  • Online:
  • Published:
Article QR Code
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063