語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Securing the Internet Control Plane.
~
Benton, Kevin.
Securing the Internet Control Plane.
紀錄類型:
書目-語言資料,手稿 : Monograph/item
正題名/作者:
Securing the Internet Control Plane./
作者:
Benton, Kevin.
面頁冊數:
1 online resource (121 pages)
附註:
Source: Dissertation Abstracts International, Volume: 79-02(E), Section: B.
Contained By:
Dissertation Abstracts International79-02B(E).
標題:
Computer science. -
電子資源:
click for full text (PQDT)
ISBN:
9780355287400
Securing the Internet Control Plane.
Benton, Kevin.
Securing the Internet Control Plane.
- 1 online resource (121 pages)
Source: Dissertation Abstracts International, Volume: 79-02(E), Section: B.
Thesis (Ph.D.)
Includes bibliographical references
The Internet carries traffic between billions of devices every day and modern societies depend on the resiliency of the routing technology behind it to work around the frequent link outages caused by natural disasters, equipment failures, destruction of cables, and even wars. However, the routing technology behind all of this, the Border Gateway Protocol (BGP), is fundamentally dependent on trust between all of the service providers running it. With tens of thousands of service providers on the Internet, malicious behavior and/or mistakes are daily occurrences that result in compromised connectivity to a subset of devices until manual operator intervention. The high frequency of these attacks and slow adoption of a secure replacement protocol dictates research into alternative solutions.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9780355287400Subjects--Topical Terms:
573171
Computer science.
Index Terms--Genre/Form:
554714
Electronic books.
Securing the Internet Control Plane.
LDR
:03259ntm a2200385Ki 4500
001
909047
005
20180419104825.5
006
m o u
007
cr mn||||a|a||
008
190606s2017 xx obm 000 0 eng d
020
$a
9780355287400
035
$a
(MiAaPQ)AAI10633937
035
$a
(MiAaPQ)indiana:14931
035
$a
AAI10633937
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
099
$a
TUL
$f
hyy
$c
available through World Wide Web
100
1
$a
Benton, Kevin.
$3
1179552
245
1 0
$a
Securing the Internet Control Plane.
264
0
$c
2017
300
$a
1 online resource (121 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Dissertation Abstracts International, Volume: 79-02(E), Section: B.
500
$a
Adviser: Jean Camp.
502
$a
Thesis (Ph.D.)
$c
Indiana University
$d
2017.
504
$a
Includes bibliographical references
520
$a
The Internet carries traffic between billions of devices every day and modern societies depend on the resiliency of the routing technology behind it to work around the frequent link outages caused by natural disasters, equipment failures, destruction of cables, and even wars. However, the routing technology behind all of this, the Border Gateway Protocol (BGP), is fundamentally dependent on trust between all of the service providers running it. With tens of thousands of service providers on the Internet, malicious behavior and/or mistakes are daily occurrences that result in compromised connectivity to a subset of devices until manual operator intervention. The high frequency of these attacks and slow adoption of a secure replacement protocol dictates research into alternative solutions.
520
$a
In this dissertation, I focus on improving the security of the BGP protocol as it is deployed throughout the Internet today. This is motivated with several case studies of well-known BGP hijacking events and a broad literature review of research into the security of BGP. The defenses proposed in this dissertation are focused on incentive alignment so the organizations adopting them are the ones who benefit. The proposed defenses fall into the following two categories: improving the security of the data plane using control plane information, and using indicators from the control plane in conjunction with other data sources to detect abnormal routes.
520
$a
A key component developed for this research is a BGP route processing framework that provides a pluggable architecture to simplify the development of new strategies for marking bad BGP routes and for reacting to routes after they are classified. This framework is used to provide prototypes of the defenses and is included as part of this dissertation.
520
$a
Looking towards future protocols, I conclude with a security analysis of OpenFlow, a much newer control plane protocol to contrast its security gaps with those of BGP.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Computer science.
$3
573171
650
4
$a
Information technology.
$3
559429
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0984
690
$a
0489
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
Indiana University.
$b
Informatics.
$3
1179553
773
0
$t
Dissertation Abstracts International
$g
79-02B(E).
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10633937
$z
click for full text (PQDT)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入