全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Vulnerability of the Border Router BGP Protocol
边界路由器BGP协议的脆弱性

Keywords: BGP protocol,vulnerability,routers,CXPST,DDoS attack
BGP协议
,脆弱性,路由器,CXPST,DDoS攻击

Full-Text   Cite this paper   Add to My Lib

Abstract:

This paper has deeply studied the vulnerability of the BGP protocol running in the backbone routers, laid special stress on analysing the CXPST Attacks algorithm, and introduced the improved shock path selection strategies, theoretically proved that the improved shock path selected strategy better. Experimental tests show that the BGP protocol attacked with the designed algorithm is more effective than that of CXPST algorithm, which can result in the backbone routers running with BGP dropping down in less time.

Full-Text

Contact Us

[email protected]

QQ:3279437679

WhatsApp +8615387084133