%0 Journal Article
%T Vulnerability of the Border Router BGP Protocol
边界路由器BGP协议的脆弱性
%A PANG Ling
%A
庞玲
%J 计算机系统应用
%D 2013
%I
%X This paper has deeply studied the vulnerability of the BGP protocol running in the backbone routers, laid special stress on analysing the CXPST Attacks algorithm, and introduced the improved shock path selection strategies, theoretically proved that the improved shock path selected strategy better. Experimental tests show that the BGP protocol attacked with the designed algorithm is more effective than that of CXPST algorithm, which can result in the backbone routers running with BGP dropping down in less time.
%K BGP protocol
%K vulnerability
%K routers
%K CXPST
%K DDoS attack
BGP协议
%K 脆弱性
%K 路由器
%K CXPST
%K DDoS攻击
%U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=8240383F08CE46C8B05036380D75B607&jid=D4F6864C950C88FFCE5B6C948A639E39&aid=72079A95883C28F7D8F6E3DB813412EF&yid=FF7AA908D58E97FA&vid=BC12EA701C895178&iid=CA4FD0336C81A37A&sid=0B4F496D54044D86&eid=8575BEDA702C4B7C&journal_id=1003-3254&journal_name=计算机系统应用&referenced_num=0&reference_num=14