Unlock instant, AI-driven research and patent intelligence for your innovation.

BGP hijacking detection method, device and equipment based on MOAS conflict event

An event and data detection technology, applied in the communication field, can solve problems such as restrictions, low deployment level, impersonation, etc., and achieve the effect of reducing deployment costs

Active Publication Date: 2021-10-01
BEIJING UNIV OF POSTS & TELECOMM
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the deployment of the RPKI authentication mechanism is not high at present, and the number of protected prefixes only accounts for one-fifth of the total number of prefixes. Therefore, the scope of existing BGP hijacking detection is relatively limited, and there are still malicious attackers impersonating Possibility of a prefix owner

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • BGP hijacking detection method, device and equipment based on MOAS conflict event
  • BGP hijacking detection method, device and equipment based on MOAS conflict event
  • BGP hijacking detection method, device and equipment based on MOAS conflict event

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to make the purpose, technical solutions and advantages of the present disclosure clearer, the present disclosure will be further described in detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0051]It should be noted that, unless otherwise defined, the technical terms or scientific terms used in the embodiments of the present disclosure shall have ordinary meanings understood by those skilled in the art to which the present disclosure belongs. "First", "second" and similar words used in the embodiments of the present disclosure do not indicate any sequence, quantity or importance, but are only used to distinguish different components. "Comprising" or "comprising" and similar words mean that the elements or items appearing before the word include the elements or items listed after the word and their equivalents, without excluding other elements or items. Words such as "connected" or "connected" are not limi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a BGP hijacking detection method and device based on an MOAS conflict event, equipment and a medium, and the method comprises the steps: obtaining real-time routing data, and detecting the MOAS conflict event based on the real-time routing data; obtaining an MOAS matrix based on the timestamps of the MOAS conflict events and observation points; judging whether the MOAS conflict event is an abnormal MOAS conflict event or not based on the behavior characteristics of the MOAS matrix; and in response to the fact that the MOAS conflict event is an abnormal MOAS conflict event, determining that BGP prefix hijacking occurs. According to the BGP prefix hijacking detection method and device, whether the MOAS conflict event is abnormal or not is judged according to the behavior characteristics shown in the MOAS conflict event, and then BGP prefix hijacking is detected. And a third-party authentication mechanism is not needed, so that the deployment cost is reduced.

Description

technical field [0001] The present disclosure relates to the technical field of communication, and in particular to BGP hijacking detection technology. Background technique [0002] Border Gateway Protocol (Border Gateway Protocol, BGP) is a routing protocol that realizes the reachability of routes between autonomous systems (Autonomous Systems, AS) and selects the distance vector of the best route. However, the BGP protocol lacks security considerations at the beginning of its design, and there are many security holes, such as the absence of authorization and identity verification mechanisms, the lack of authentication of received BGP routing information, and the inability to guarantee routing information in the process of routing propagation. It cannot be tampered with, that is, the AS fully trusts the reachability information from neighbors, including false routing information due to configuration errors or malicious forgery. Therefore, the BGP protocol has become the ta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/741H04L45/74
CPCH04L63/1416H04L63/1466H04L45/54
Inventor 黄小红张沛李丹丹谢坤陈开宇
Owner BEIJING UNIV OF POSTS & TELECOMM