Abstract
The Border Gateway Protocol (BGP) is the standard inter-domain route protocol on the Internet. Autonomous System (AS) traffic is forwarded by the BGP neighbors. In the route selection, if there are malicious or inactive neighbors, it will affect the network’s performance or even cause the network to crash. Therefore, choosing trusted and safe neighbors is an essential part of BGP security research. In response to such a problem, in this paper we propose a BGP Neighbor Trust Establishment Mechanism based on the Bargaining Game (BNTE-BG). By combining service quality attributes such as bandwidth, packet loss rate, jitter, delay, and price with bargaining game theory, it allows the AS to select trusted neighbors which satisfy the Quality of Service independently. When the trusted neighbors are forwarding data, we draw on the gray correlation algorithm to calculate neighbors’ behavioral trust and detect malicious or inactive BGP neighbors.
1. Introduction
Currently, the Border Gateway Protocol (BGP) [] is the only inter-domain route protocol used on the Internet and is the key component of the Internet route infrastructure. However, the designers of the BGP did not initially consider security issues, which led to the BGP’s security vulnerability []. Existing research [,,,,] mostly protects Autonomous System (AS) traffic data by verifying the authenticity and integrity of routing information. However, how to confirm trusted neighbors is also an important issue. Neighbors play an important role in the BGP protocol. Due to the large scale and dynamic nature of the Internet, AS data must rely on neighbors to reach the destination network. If an AS establishes a neighbor relationship with a malicious/inactive AS, the AS data will not be forwarded efficiently. Malicious/inactive neighbors will restrict AS network traffic by setting routing policies []. For example, some inactive neighbors will adopt the “hot potato” [] routing strategy to reduce the overhead caused by traffic passing through the domain and choose the fastest exit from the domain, regardless of its path length through other networks. Even malicious/inactive neighbors will launch malicious attacks, causing the AS network to paralyze. For example, in May 2004, DataOne, an internet service provider in Malaysia, announced to its neighbors the prefix of Yahoo’s data center in Santa Clara, California, which caused the network of neighbors to go down. Therefore, establishing a safe and trusted neighbor relationship is a key issue in BGP security research.
In researching about the BGP neighbor trust establishment mechanism, we must first realize that deploying any security mechanism on the BGP will have a certain impact on it. Therefore, it should be easy to deploy and achieve security protection. Easy to deploy means that the security mechanism added to the BGP should minimize the impact on it, such as increased storage and resource overhead, the impact of convergence time, and scalability. Security protection means that it should allow the arbitrary AS to establish neighbor relationships with trusted ASes. The two ASes involved in neighbor establishment belong to different Internet Service Providers (ISPs). Thus, ASes are profit-seeking and selfish. It must consider the practical factors and encourage ASes to establish a trusted neighbor relationship. For the BGP trusted neighbor, there are some relevant studies. For example, some researchers have introduced trust technology [,,,,] to inter-domain security research. Its basic idea is to construct a reputation system by evaluating the target AS’s behaviors. However, the evaluation result has uncertainty. It is not easy to guarantee safety. Yi et al. [] proposed a Neighbor-specific BGP (NS-BGP) mechanism based on specific neighbors. By remodeling the route export and import strategy, the BGP routers can customize routes for each neighbor flexibly. However it does not take into account the AS’s selfishness. Besides, the above solutions did not discuss the pros and cons of neighbors’ service performance during the operation of the BGP protocol, such as bandwidth, packet loss rate, jitter, and delay. Thus, studying the BGP neighbor trust establishment mechanism, which is easy to deploy and can provide security protection, has important theoretical value and practical significance.
Since the AS is a rational entity driven by customer needs, we can describe the BGP neighbor trust established as a cooperation between the AS and the adjacent AS on network service quality. This cooperation has the following characteristics: (1) In the process of cooperation, both the AS and the adjacent AS will pursue the maximization of interests, and there is a game of interests between them. (2) As the BGP neighbor establishment process is based on the Transmission Control Protocol (TCP), the AS and the adjacent AS can interact dynamically through a three-way handshake protocol. Based on these two characteristics, we propose a BGP Neighbor Trust Establishment Mechanism based on the Bargaining Game (BNTE-BG). The bargaining game [,,,] is a game process in which participants with common interests try to reach a consensus when facing conflict. During the game, the AS and the adjacent AS can flexibly negotiate bandwidth, packet loss rate, jitter, delay, and payment price according to their own preferences. When the negotiation is successful, the AS judges the adjacent AS as a trusted neighbor, and they establish a neighbor relationship. When the negotiation fails, the AS judges the adjacent AS as an untrusted neighbor, and they do not establish a neighbor relationship. When trusted neighbors start work, we draw on the gray correlation algorithm [] to design a detection algorithm for evaluating its behavioral trust, that is, to detect whether the bandwidth, packet loss rate, jitter, and delay of the data traffic meet the negotiated agreement. Through the detection algorithm, we can detect malicious/inactive neighbors.
The main contributions of this paper are as follows: (1) We propose a BGP neighbor trust establishment mechanism based on the bargaining game, which allows an AS to select trusted neighbors that meet the network service quality. (2) We draw on the gray correlation algorithm to detect malicious/inactive BGP neighbors. The advantages of the above work are as follows: Using bargaining game theory, an AS can independently choose trusted neighbors according to its own security strategy; the services quality is guaranteed by negotiating service quality attributes such as bandwidth, packet loss rate, jitter, and delay; by detecting malicious/inactive neighbors, the loss of AS is effectively reduced.
The rest of the paper is organized as follows. In Section 2, we discuss research related to BGP security protection. Section 3 introduces the bargaining game model and proposes the BGP neighbor trust mechanism based on the bargaining game. Section 4 describes the detection mechanism of BGP malicious/inactive neighbors. In Section 5, we provide details of the simulated experiment and efficiency analysis. Finally, conclusions are drawn in Section 6.
2. Related Work
To date, there have been many studies on BGP security, which are mainly divided into BGP security extension and abnormal route detection. The main research results in BGP security extension are Secure BGP (S-BGP) [], secure origin BGP (soBGP) [], and pretty security (psBGP) []. The most complete and representative work is S-BGP. S-BGP protocol uses digital certificates and digital signatures to verify the credibility of routing information. Although these solutions can effectively guarantee BGP security, they have not been implemented on the Internet due to difficulties in deployment.
Anomaly detection is one of the methods to protect BGP route security. The core work of anomaly detection is to diagnose and analyze the characteristics of abnormal behavior on the network, and then identify the abnormal behavior and information and send an alarm to the victim. The main research results in this field are Prefix Hijack Alert System (PHAS) [] and iSPY []. Although anomaly detection can detect incorrect routes from route information, it cannot prevent malicious ASes from declaring untrusted routes again. The detection result also depends on the attack feature extraction algorithm and route data set, and there will be certain errors.
Simultaneously, more and more researchers have proposed methods to solve BGP security problems from the perspective of identifying trusted ASes. It is a feasible method besides security extension and anomaly detection. One study [] shows that the reputation mechanism has an incentive effect, effectively reducing the propagation speed of false information and inhibiting deceptive behavior. The inter-domain routing system has the conditions to establish a reputation mechanism. Yu et al. [] proposed a distributed reputation protocol for cooperation between ASes. The key idea is to simulate the trust relationship in the real world, where an AS can selectively receive information collected from neighbors. Konte et al. [] proposed the AS reputation system, ASwatch, which can identify a malicious AS by monitoring the credibility of its behavior. Experimental results show that ASwatch can detect 93% of malicious ASes, and the false alarm rate is only 5%. Siganos [] proposed a neighbor watch method, where ASes form a trusted group and monitor abnormal ASes by exchanging information and querying abnormal results. Literature [] proposed the AS-TRUST mechanism. This analyzes the collected update messages and forms different types of feedback, and then uses the Bayes algorithm to calculate the reputation of a global AS.
Inter-domain trust technology is a lightweight solution with good implementation capability. At the same time, it can incentivize legitimate ASes to punish malicious ASes and improve overall inter-domain security. In recent years, it has received increasing attention from researchers
3. The BGP Neighbor Trust Mechanism Based on the Bargaining Game
3.1. Related Definitions
To facilitate the introduction of our mechanism, this section provides the relevant concepts and definitions.
Definition 1.
The service quality attribute vector is the attribute index used to describe the Quality of Service (QoS) and price. It comprises bandwidth, packet loss rate, jitter, delay, and price. We mark it as , , , , } ={bandwidth, packet loss rate, jitter, delay, price}. For attributes such as bandwidth, the larger they are, the better the QoS. We call them benefit attributes . For attributes such as packet loss rate, jitter, and delay, the smaller they are, the better the QoS. We call them cost attributes . To facilitate implementation, we classify the “price” attribute as the cost attribute.
Definition 2.
The BGP trusted neighbor refers to neighbor routers that provide QoS, which is within the acceptable range.
3.2. Bargaining Game Model
This section draws on the bargaining game model. The bargaining model is made of seven tuples of the form <seller, buyer, Xacc, Xpro, Un, δn, Tn>. Here, represents the owner of the resource; represents the requester of good QoS; represents the range of acceptable service quality attribute vector for the ; represents the range of service quality attribute vector that the can provide; represents ’s or ’s payoffs; represents or ’s negotiation ability; and represents ’s or ’s number of quotations. A bargaining game consists of three steps—setup system parameter, quote, and dicker judgment—as follows:
- Setup System Parameter. sets the service quality attribute vector range . sets the service quality attribute vector range . and are private information and will not be disclosed to the public.
- Quote. Within the number of quotations , given , and the current quotation number , / generates the th service quality attribute quotation vector , .
- Dicker Judgment. Within the number of quotations , given the service quality attribute quotation vector , / calculates the payoff . When is greater than or equal to the expected payoff, it outputs “True”. The negotiation is successful and the game ends. When is less than the expected payoff, it outputs “False”. The negotiation continues.
- If the and fail to reach an agreement within the deadline, the negotiation ends.
3.3. BNTE-BG Mechanism
In the BGP neighbor establishment process, first, ASes with different AS numbers complete the TCP connection at the transport layer and then exchange the parameters through the Finite State Machine (FSM). We will combine the bargaining game model with the first stage of BGP neighbor establishment, proposing BNTE-BG. The mechanism process is as follows:
- System Initialization. The BGP router sets the service quality attribute vector range and independently. represents the range of service quality attributes that the BGP router can accept. represents the minimum value of each service quality attribute that can be accepted. represents the maximum value of each service quality attribute that can be accepted. represents the range of service quality attributes that the BGP router can provide []. represents the minimum value of each service quality attribute that can be provided. } represents the maximum value of each service quality attribute that can be provided. The specific settings are as follows:where , , , , and are defined as in Section 3.1.
Simultaneously, the BGP router sets and . is the neighbor trust establishment requester’s expected payoff. is the neighbor trust establishment agreer’s expected payoff.
- 2.
- The BGP Neighbor Trust Establishment Process. We suppose that wants to establish a trusted neighbor relationship with its adjacent . is the neighbor trust establishment requester, with the service quality attribute vector range , the negotiation ability and the expected payoff . is the neighbor trust establishment agreer, with the service quality attribute vector range , the negotiation ability , and the expected payoff . The number of quotations for / is /. In order to better describe the process, we take . The implementation of BNTE-BG is shown in Figure 1 and Algorithm 1:
- Step 1:
- First, initiates a neighbor trust establishment request to . It uses the service quality attribute vector range , the current quotation number and the negotiation ability to generate the service quality attribute quotation vector through the quote strategy function . Then adds it to the TCP message and sends it to .
- Step 2:
- When receives the new TCP message from , it extracts the service quality attribute quotation vector . It calculates the payoff, then judges whether ’s satisfy the expected payoff . If it does, outputs “Establish neighbor”. If not, it uses the service quality attribute vector range , the current quotation number , and the negotiation ability to generate the service quality attribute quotation vector through the quote strategy function . Then adds it to the TCP message and sends to .
- Step 3:
- When receives the new TCP message from , it extracts the service quality attribute quotation vector . It calculates the payoff, then judges whether ’s satisfy the expected payoff . If it does, outputs “Establish neighbor”. If not, it outputs “Establish neighbor failed”.
Figure 1.
BNTE-BG flowchart.
The functions involved in Algorithm 1 are described as follows:
- indicates that the BGP router sends its service quality attribute quotation vector to the adjacent BGP router.
- indicates that performs th quotation to generate the service quality attribute quotation vector .
- indicates that performs th quotation to generate the service quality attribute quotation vector .
- indicates that obtains the payoff accepting the service quality attribute quotation vector .
- indicates that AS2 obtains the payoff accepting the service quality attribute quotation vector.
- indicates that / determines whether to establish a neighbor relationship.
Algorithm 1: BNTE-BG establishment Input: , , , , , , , , , Output: Establish neighbor, Establish neighbor failed 1: , ;
2: if ()3: { 4: ; 5: ; 6: send () to ;
7: go 17;
8:
9: else
10: output Establish neighbor failed;
11: ;
12: ;
13: if (
14: output Establish neighbor
15: else
16: go 2;
17: ;
18: ;
19: if (
20: output Establish neighbor;
21: else if ()
22: {
23: ;
24: ;
25: send () to ;
26: go 11;
27: }
28: else
29: output Establish neighbor failed
3.4. Implementation of BNTE-BG Mechanism
This section explains the implementation of the functions in the BNTE-BG. and call ,, ,, and . The implementation of the functions is as follows:
- The quote strategy function is implemented as follows:
When wants to send the th quotation to , it calls to generate the th service quality attribute quotation vector .
Calculate the benefit attribute quotation as Formula (1)
Calculate the cost attribute quotation as Formula (2)
where , , , concession factor , and are set by .
- The quote strategy function is implemented as follows:
When wants to send the th quotation to , it calls to generate the th service quality attribute quotation vector .
Calculate the benefit attribute quotation as Formula (3)
Calculate the cost attribute quotation as Formula (4)
where , , , concession factor , and are set by .
- The payoff function and dicker judgment function are implemented as follows:
When receives the service quality attribute quote vector , it calls to judge whether to establish a neighbor relationship.
Step 1: Call function to generate the total payoff .
For the benefit attribute , the payoff of is calculated as Formula (5)
For the cost attribute , the payoff of is calculated as Formula (6)
Standardized processing:;
Calculate the total payoff of as Formula (7)
where represents ’s private preference for service quality attributes. It is set by .
Step 2: Call to determine whether to establish a neighbor relationship.
- The payoff function and dicker judgment function are implemented as follows:
When receives the service quality attribute quote vector , it calls to judge whether to establish a neighbor relationship.
Step 1: Call function to generate the total payoff .
For benefit attribute , the payoff of is calculated as Formula (8)
For cost attribute , the payoff of is calculated as Formula (9)
Standardized processing:;
Calculate the total payoff of as Formula (10)
where represents ’s private preference for service quality attributes, It is set by .
Step 2: Call to determine whether to establish a neighbor relationship.
Therefore, as long as AS follows the BNTE-BG mechanism during the neighbor establishment process, it can be guaranteed to establish a neighbor relationship with the trusted AS. The quote strategy function is based on the premise that AS is rational and willing to cooperate.
4. The Detection Mechanism of the BGP Malicious/Inactive Neighbors
This section mainly presents the detection algorithm of AS and the BGP malicious/inactive neighbors’ detection process.
Definition 3.
Behavioral trust is the credibility of BGP neighbors’ behavior when trusted neighbors forward data every time, denoted by
(.
Detection Process
Let us assume and have established a trusted neighbor relationship through the process described in Section 3.
represents their agreement on bandwidth, packet loss rate, jitter, delay, and price. At this time, needs to calculate ’s behavioral trusts and checks whether it is a malicious/inactive neighbor. The specific process is as follows:
- Step 1:
- collects the data set of bandwidth, packet loss rate, jitter, and delay when forwards traffic times. The data set is marked as .
- Step 2:
- draw on the gray correlation algorithm to calculate the ’s behavioral trust . Since , , and are the cost attributes, to facilitate calculation, we use the worst packet loss rate R, the largest jitter J, and the longest delay D in the actual network to process data with the same attributes in the data set . The detection algorithm is Algorithm 2.
- Step 3:
- If behavioral trusts are all within the normal range, and continue to maintain the trusted neighbor relationship. If the behavioral trust appears abnormal, go to Step4.
- Step 4:
- sends a warning to and sets the number of forwarding . continues to calculate the ’s behavioral trusts when it forwards times.
- Step 5:
- If behavioral trusts are all within the normal range, and continue to maintain the trusted neighbor relationship. If still appears abnormal, judges as the malicious/inactive neighbor. Then, stops paying and filters the routing information announced/forwarded by .
Algorithm 2: Detection algorithm Input:, , R, J, D Output: 1: =; =R-;=J-;=D-;
2: for (i =1; i<=; i++)3: { 4: if ( 5: output = 1;
6: else
7: {
8: = R-;=J-;=D-;
9: for (j=1; j<=4; j++)
10: {
11: =
12: }
13: output =;
14: }
15: }
5. Simulation and Efficiency Analysis
This section mainly discusses the efficiency of the BNTE-BG mechanism and the detection algorithm’s correctness. In terms of correctness, we mainly investigate whether the detection algorithm can correctly describe neighbors’ behavior. In terms of efficiency, we consider storage increment and average convergence time. Storage increment includes the message increment and storage overhead. In terms of route average convergence time, we mainly consider the number of neighbor establishments, the number of quotations and the time spent, and the number of dicker judgments and the time spent.
5.1. Correctness
Correctness means that the detection algorithm can effectively describe whether the trusted neighbor’s behaviors meet the negotiation agreement. The AS can judge malicious/inactive neighbors by the detection result. The experimental scene settings are as follows: the neighbor trust establishment requester and the neighbor trust establishment agreer have successfully established a trusted neighbor relationship through the BNTE-BG mechanism, and has forwarded data times. Negotiation agreement is = {50, 0.1, 15, 60, 300}. R = 1, J = 200 ms, D = 500 ms, . Table 1 shows the data set collected by .
Table 1.
Data set collected by .
Figure 2 shows the changes in ’s behavioral trusts, which are (1, 1, 0.8331, 0.8729, 0.4998, 0.3126, 0.2557). In the first and second forwardings, ’s service fully meets the negotiation agreement, and the behavioral trusts are 1. In the third, fourth, and fifth forwardings, the service provided by could not fully meet the negotiation agreement. Among them, in the third and fourth forwardings, the service provided by is not much different from the negotiation agreement, and ’s behavioral trusts are greater than 0.8. In the fifth forwarding, the ’s service is too far away from the negotiation agreement, and the behavioral trust is less than 0.5. In the sixth and seventh forwardings, the ’s service completely deviates from the negotiation agreement, and the behavioral trusts are only about 0.3. During the entire period, the quality of services provided by gradually declined, and ’s behavioral trusts also gradually decreased. The results show that our detection algorithm can effectively characterize the behavior of . When detects that the sixth and seventh time’s behavior trusts are too low, it could issue a warning to to further verify whether it is a malicious neighbor. The can also analyze the bandwidth and packet loss rate of the sixth and seventh forwarding to determine whether the is a malicious/inactive neighbor. Due to the limited length of this paper, no more experiments will be carried out.
Figure 2.
The behavioral trust of .
5.2. Storage Increment
First, we consider the increase in the TCP message’s length after adding the BNTE-BG mechanism. Because the BNTE-BG mechanism adds service quality attribute negotiation to the first stage of neighbor establishment, it is necessary to add a service quality attribute quotation vector to the TCP message, which will cause message expansion. The service quality attributes contain the bandwidth, packet loss rate, delay, jitter, and price. Each attribute occupies one byte. Therefore, the TCP message’s length in the BNTE-BG mechanism is 5 bytes longer than that of the BGP.
Secondly, in storage overhead, the AS guarantees data service quality by negotiating with the adjacent AS in BNTE-BG. Therefore, each BGP router only needs 20 bytes to store the service quality attribute vector range ( and ). Table 2 shows us the storage increment of the BNTE-BG mechanism.
Table 2.
Storage increment of BNTE-BG.
From Table 2, we can see that the storage increment of the BNTE-BG mechanism is very small, so the burden on BGP routers will not be great.
5.3. Average Convergence Time
In the BNTE-BG mechanism, we add the service quality attribute quotations and payoffs calculations during the TCP three-way handshake, which will cause a time delay. Therefore, adding the BNTE-BG mechanism to the BGP will have an impact on the convergence time. The average convergence time is related to the number of neighbor establishment instances , the number of quotations , the time spent in quotation calculation , the number of dicker judgments , and the time spent in dicker judgment , etc. Assuming that the number of ASes in the network topology is , the maximum number of neighbor establishment times are . In the BGP protocol neighbor establishment process, after the TCP connection is completed at the transport layer, it needs to exchange parameters through FSM. If exchanging parameters fails, the neighbor establishment will fail. Thus, a successful neighbor establishment has a probably. Assuming that the probability of a successful FSM is , then the convergence time increment model is as follows:
where represents the increase in convergence time after adding the BNTE-BG mechanism to the BGP.
Before the average convergence time experiment, we analyze the influence of concession factor , the negotiation ability and, the number of quotations on representing the concession of AS.
By setting = 0.8, we respectively examined the changes of under= 0.1, = 0.5, and = 0.9.
The experimental results are shown in Figure 3; the greater the value of k, the greater the concession that AS will make, but the lower the concession rate.
Figure 3.
The influence of concession factor on .
By setting k = 0.4, we respectively examined the changes of under = 3, = 5 and = 7.
The experimental results are shown in Figure 4; the fewer the number of quotations, the greater the concession and concession rate of AS.
Figure 4.
The influence of the number of quotations on .
We set = 0.4 and examined the changes of under = 0.1, = 0.5, and = 0.9.
The experimental results are shown in Figure 5; the greater the value of , the greater the concession that AS will make. When = 0.1, initially increases rapidly and then tends to level off. When = 0.9, increases at a steady speed. Therefore, can be divided into two types. When , the AS is eager to establish neighbor relations. When , the AS is calm and has enough patience to negotiate.
Figure 5.
The influence of negotiation ability on .
In the average convergence time experiment, we use the CAIDA IPv4 Routed/24 Topology Dataset [] and extract some subgraphs from it for experiments. The specific parameters were set as follows: the link delay was 0.6 s, = 0.9, = 0.7, = 0.5, and = 3. The purpose of the experiment is to investigate the changes in the average convergence time of BNTE-BG, BGP, and NS-BGP mechanisms as the size of the AS topology changes. The experimental results are shown in Figure 6.
Figure 6.
Average convergence time.
As the topology’s scale expands and the number of neighbor establishments increases, the average convergence time of the BNTE-BG mechanism, BGP, and NS-BGP mechanism gradually increases. At the same time, the convergence speed of the BNTE-BG mechanism and the NS-BGP mechanism decreases. Because the BNTE-BG mechanism adds quotations and payoffs calculations during the neighbor establishment phase, the average convergence time is longer than that of the BGP. NS-BGP needs a special route for each neighbor, and the average convergence time will be longer than that of the BGP. Unlike NS-BGP, which requires special calculations for the needs of each neighbor, the BNTE-BG mechanism only needs to negotiate at a fixed time, so the average convergence time of the BNTE-BG mechanism is less than that of NS-BGP. Experimental results show that the BNTE-BG mechanism has better convergence than the NS-BGP mechanism.
6. Conclusions
The secure establishment of neighbors in the BGP is an important issue of BGP security. Research resources are scarce, and an easily deployed neighbor trust establishment mechanism is still an important research direction. Therefore, this paper proposes a BGP neighbor trust establishment mechanism based on the bargaining game, BNTE-BG, which combines the bargaining game model with bandwidth, delay, jitter, packet loss rate, and price. It allows ASes to choose trusted neighbors that meet route security requirements flexibly and ultimately achieves network security. When the trusted neighbor is working, we use the gray correlation algorithm to calculate the behavioral trust of the trusted neighbor, and effectively detect malicious/inactive neighbors. The BNTE-BG mechanism has the advantages of less storage increment, less modification of the BGP protocol content, and easier implementation in networks with complex business relationships. Based on analysis of correctness experiments, the detection algorithm can effectively detect malicious/inactive neighbors. Our future research will further expand the service quality attributes, such as adding the attribute “geographic location”, so that ASes can select trusted neighbors in more detail.
Author Contributions
Conceptualization, P.L. and D.L.; methodology, P.L.; software, P.L. and D.L.; validation, D.L. and B.L.; formal analysis, P.L. and B.L.; investigation, P.L.; data curation, P.L. and B.L.; writing—original draft preparation, P.L.; writing—review and editing, P.L. and D.L.; project administration, D.L.; funding acquisition, D.L. All authors have read and agreed to the published version of the manuscript.
Funding
This research was funded by the National Natural Science Foundation of China (No.61662004).
Conflicts of Interest
The authors declare no conflict of interest.
References
- Rekhter, Y.; Li, T.; Hares, S. A Border Gateway Protocol 4 (BGP-4). Network Working Group. 2006. Available online: https://www.rfc-editor.org/rfc/pdfrfc/rfc4271.txt.pdf (accessed on 10 May 2020).
- Murphy, S. BGP Security Vulnerabilities Analysis. Network Working Group. 2006. Available online: https://www.rfc-editor.org/rfc/pdfrfc/rfc4227.txt.pdf (accessed on 15 May 2020).
- White, R. Securing BGP through secure origin BGP (soBGP). Bus. Commun. Rev. 2003, 6, 15–22. [Google Scholar]
- Kent, S.; Lynn, C.; Seo, K. Secure border gateway protocol (S-BGP). IEEE J. Sel. Areas Commun. 2000, 18, 582–592. [Google Scholar] [CrossRef]
- Oorschot, P.C.; Wan, T.; Kranakis, E. On interdomain routing security and pretty secure BGP (psBGP). ACM TOPS 2007, 10. [Google Scholar] [CrossRef]
- Liu, Y.; Deng, W.; Liu, Z.; Huang, F. 3S: Three-signature path authentication for BGP security. Secur. Commun. Netw. 2015, 18, 3002–3014. [Google Scholar] [CrossRef]
- Xing, Q.; Wang, B.; Wang, X. Blockchain-based internet number resource authority and bgp security solution. Symmetry 2018, 10, 408. [Google Scholar] [CrossRef]
- Gao, L.; Rexford, J. Stable Internet routing without global coordination. IEEE-ACM Trans. Netw. 2001, 9, 681–692. [Google Scholar]
- Teixeira, R.; Shaikh, A.; Griffin, T.G.; Rexford, J. Impact of hot-potato routing changes in IP networks. IEEE-ACM Trans. Netw. 2008, 16, 1295–1307. [Google Scholar] [CrossRef][Green Version]
- Resnick, P.; Zeckhauser, R.; Friedman, E.; Kuwabara, K. Reputation systems: Facilitating trust in Internet interactions. Commun. ACM 2000, 43, 45–48. [Google Scholar] [CrossRef]
- Yu, H.; Rexford, J.; Felten, E.W. A distributed reputation approach to cooperative internet routing protection. In Proceedings of the 1st IEEE ICNP Workshop on Secure Network Protocols, 2005. (NPSec), Boston, MA, USA, 6 November 2005; pp. 73–78. [Google Scholar]
- Konte, M.; Perdisci, R.; Feamster, N. Aswatch: An as reputation system to expose bulletproof hosting ases. In Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, London, UK, 17–21 August 2015; Association for Computing Machinery: New York, NY, USA, 2015. [Google Scholar]
- Siganos, G.; Faloutsos, M. Neighborhood watch for internet routing: Can we improve the robustness of internet routing today? In Proceedings of the IEEE INFOCOM 2007-26th IEEE International Conference on Computer Communications, Barcelona, Spain, 6–12 May 2007. [Google Scholar]
- Chang, J.; Venkatasubramanian, K.K.; West, A.G.; Kannan, S.; Loo, B.T.; Sokolsky, O.; Lee, I. AS-TRUST: A Trust Quantification Scheme for Autonomous Systems in BGP. International Conference on Trust and Trustworthy Computing; Springer: Berlin/Heidelberg, Germany, 2011; pp. 262–276. [Google Scholar]
- Wang, Y.; Schapira, M.; Rexford, J. Neighbor-specific BGP: More flexible routing policies while improving global stability. In Proceedings of the Eleventh International Joint Conference on Measurement and Modeling of Computer Systems, Seattle, WA, USA, 15–19 June 2009; Association for Computing Machinery: New York, NY, USA, 2009; pp. 217–228. [Google Scholar]
- Rubinstein, A. Perfect equilibrium in a bargaining model. Econometrica 1982, 50, 97–109. [Google Scholar] [CrossRef]
- Njilla, L.Y.; Pissinou, N. Dynamics of data delivery in mobile ad-hoc networks: A bargaining game approach. In Proceedings of the 2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA), Verona, NY, USA, 26–28 May 2015; pp. 1–6. [Google Scholar]
- Liu, C.; Li, K.; Tang, Z. Bargaining game-based scheduling for performance guarantees in cloud computing. ACM TOMPECS 2018, 3, 1–25. [Google Scholar] [CrossRef]
- Li, P.; Han, B.; Li, H.; Hou, D.; Liu, D.; Wang, G. The Research of Dynamic Spectrum Allocation Based on Nash Bargaining Game. In Proceedings of the 2018 IEEE 4th Information Technology and Mechatronics Engineering Conference (ITOEC), Chongqing, China, 26–28 May 2018; pp. 70–74. [Google Scholar]
- Sun, G.; Guan, X.; Yi, X.; Zhou, Z. Gray relational analysis between hesitant fuzzy sets with applications to pattern recognition. Expert Syst. Appl. 2018, 92, 521–532. [Google Scholar] [CrossRef]
- Lad, M.; Massey, D.; Pei, D.; Wu, Y.; Zhang, B.; Zhang, L. PHAS: A Prefix Hijack Alert System. In Proceedings of the USENIX Security Symposium, Vancouver, BC, Canada, 31 July–4 August 2006. [Google Scholar]
- Zhang, Z.; Zhang, Y.; Hu, Y.C. iSPY: Detecting IP prefix hijacking on my own. IEEE-ACM Trans. Netw. 2010, 18, 1815–1828. [Google Scholar] [CrossRef]
- Li, J.; Luo, H.; Zhang, S.; Li, H.; Yan, F. Design and implementation of efficient control for incoming inter-domain traffic with information-centric networking. J. Netw. Comput. Appl. 2019, 133, 109–125. [Google Scholar] [CrossRef]
- The CAIDA Internet Topology Data Kit. 2019.01. Available online: https://www.caida.org/data/internet-topology-data-kit (accessed on 3 March 2021).
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).