共 24 条
- [1] REKHTER Y, LI T, HARES S., A border gateway protocol 4(BGP-4), (2006)
- [2] WANG N, DU X H, WANG W J, Et al., A survey of the border gateway protocol security, Chinese Journal of Computers, 40, 7, pp. 1626-1648, (2017)
- [3] HUDAIB A A Z, HUDAIB E A Z., DNS advanced attacks and analysis, International Journal of Computer Science and Security (IJCSS), 8, 2, (2014)
- [4] MIRKOVIC J, REIHER P., A taxonomy of DDoS attack and DDoS defense mechanisms, ACM SIGCOMM Computer Communication Review, 34, 2, pp. 39-53, (2004)
- [5] CONTI M, DRAGONI N, LESYK V., A survey of man in the middle attacks, IEEE Communications Surveys & Tutorials, 18, 3, pp. 2027-2051, (2016)
- [6] HUSTON G, MICHAELSON G., Validation of route origination using the resource certificate public key infrastructure (PKI) and route origin authorizations (ROAs), (2012)
- [7] KENT S, LYNN C, SEO K., Secure border gateway protocol (S-BGP), Proceedings of IEEE Journal on Selected Areas in Communications, pp. 582-592, (2002)
- [8] WHITE R., Architecture and deployment considerations for secure origin BGP (soBGP), (2006)
- [9] WHITE R., Securing BGP through secure origin BGP (soBGP), Business Communications Review, 33, 5, (2003)
- [10] LEPINSKI M, SRIRAM K., BGPsec protocol specification, (2017)