地区网络边界发现方法
作者:
作者简介:

朱金玉(1993-),女,博士生,主要研究领域为互联网关键资源安全,IP地理定位;张宏莉(1973-),女,博士,教授,博士生导师,CCF专业会员,主要研究领域为网络安全,网络测量和网络计算;张宇(1979-),男,博士,副教授,CCF高级会员,主要研究领域为互联网关键资源安全,网络拓扑测量,未来网络体系结构;方滨兴(1960-),男,博士,教授,博士生导师,CCF会士,主要研究领域为网络信息安全,信息内容安全;曾良伟(1995-),男,硕士,主要研究领域为互联网关键资源安全.

通讯作者:

张宇,yuzhang@hit.edu.cn

中图分类号:

TP393

基金项目:

国家重点研发计划(2016QY01W0103,2016QY01W0105)


Method of Discovering Regional Network Border
Author:
  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [38]
  • |
  • 相似文献 [20]
  • |
  • 引证文献
  • | |
  • 文章评论
    摘要:

    地区网络边界刻画了现实世界国家和地区之间在网络空间中的拓扑界限.提出了一种主被动结合的双阶段地区网络边界发现方法——RNB (regional network border).第1阶段,基于定向拓扑测量与地理定位方法发现目标地区网络边界片段;第2阶段,基于多源信息加权定位和双重PING定位在边界片段中精准发现网络边界.实验以中国网络为对象,与CAIDA数据集相比,仅以2.5%的探测代价新发现了37%的边界节点,共计1 644个.经人工验证的一致率为99.3%,经某运营商验证的准确率为75%.

    Abstract:

    The regional network border describes the topological border nodes in cyberspace among countries and regions in the real world. By combining active and passive measurement techniques, this study proposes a dual-stage method of discovering regional network border (RNB) nodes. The first stage is to discover the regional network border's candidate sets by using directed topology measurement and multi-source geolocation. The second stage is to accurately identify border nodes from the candidate sets by using multi-source information weighted geolocation and dual PING geolocation. The experiment took China as the target region and discovered 1 644 border nodes. Compared with the CAIDA data set, the proposed approach's results have 37% of exclusively discovered border nodes with only 2.5% of the measurement cost. The accuracy rate under manual verification is 99.3%, and that under the verification of an ISP operator is 75%.

    参考文献
    [1] Zhang Y, Fang BX, Zhang HL.Chinese IP-level network topology measurement and analysis.Journal of Communications, 2007, 28(12):96-101(in Chinese with English abstract).[doi:10.3321/j.issn:1000-436x.2007.12.016]
    [2] Zhang Y, Zhang HL, Fang BX.A survey on Internet topology modeling.Ruan Jian Xue Bao/Journal of Software, 2004, 15(8):1220-1226(in Chinese with English abstract).http://www.jos.org.cn/1000-9825/15/1220.htm
    [3] Zhang HL, Fang BX, Hu MZ, Jiang Y, Zhan CY, Zhang SF.A survey on Internet measurement and analysis.Ruan Jian Xue Bao/Journal of Software, 2003, 14(1):110-116(in Chinese with English abstract).http://www.jos.org.cn/1000-9825/14/110.htm
    [4] Dainotti A.Mapkit:Investigating the susceptibility of the Internet topology to country-level connectivity disruption and manipulation.2017.https://www.caida.org/funding/satc-mapkit/satc-mapkit_proposal.xml
    [5] Raman RS, Stoll A, Dalek J, Dalek J, Sarabi A, Ramesh R, Scott W, Ensafi R.Measuring the deployment of network censorship filters at global scale.In:Proc.of the Network and Distributed System Security.2020.https://dx.doi.org/10.14722/ndss.2020.23099
    [6] Poese I, Uhlig S, Gueye B.IP geolocation databases:Unreliable? ACM SIGCOMM Computer Communication Review, 2011, 41(2):53-56.[doi:10.1145/1971162.1971171]
    [7] CAIDA.Macroscopic topology measurements project and the archipelago measurement infrastructure.2006.https://www.caida.org/projects/macroscopic/
    [8] Giotsas V, Dhamdhere A, Claffy KC.Periscope:Unifying looking glass querying.In:Proc.of the Passive and Active Network Measurement Conf.Workshop.2016.177-189.
    [9] Wang ZF, Feng J, Xing CY, Zhang GM, Xu B.Research on the IP geolocation technology.Ruan Jian Xue Bao/Journal of Software, 2014, 25(7):1527−1540(in Chinese with English abstract).http://www.jos.org.cn/1000-9825/4621.htm[doi:10.13328/j.cnki.jos.004621]
    [10] Zhu JY, Zhang Y, Zeng LW, Yu ZX, Zhang HL.Geolocation for multi-interface routers.Journal of Cyber Security, 2018, 3(4):15-24(in Chinese with English abstract).[doi:10.19363/J.cnki.cn10-1380/tn.2018.07.02]
    [11] Katz-Bassett E, John JP, Krishnamurthy A, Wetheerall D.Towards IP geolocation using delay and topology measurements.In:Proc.of the Internet Measurement Conf.2006.71-84.
    [12] Gueye B, Ziviani A, Crovella M, Fdida S.Constraint-based geolocation of Internet hosts.IEEE/ACM Trans.on Networking, 2006, 14(6):1219-1232.[doi:10.1109/TNET.2006.886332]
    [13] Wong B, Stoyanov I, Sirer EG.Octant:A comprehensive framework for the geolocalization of Internet hosts.In:Proc.of the Networked Systems Design & Implementation.USENIX Association, 2007.313-326.
    [14] Dong Z, Perera RDW, Chandramouli R, Subbalakshmi KP.Network measurement based modeling and optimization for IP geolocation.Computer Networks the Int'l Journal of Computer & Telecommunications Networking, 2011, 56(1):85-98.[doi:10.1016/j.comnet.2011.08.011]
    [15] Vixie VD, Goodwin P, Dickinson T.A Means for Expressing Location Information in the Domain Name System.RFC1876, IERF, 1996.
    [16] Chabarek J, Barford P.What's in a name? Decoding router interface names.In:Proc.of the Hotplanet, ACM Workshop.2013.3-8.
    [17] MaxMind.https://www.maxmind.com
    [18] IP2Location.https://www.ip2location.com/
    [19] Wei ZH, Chen M, Zhao HH, Ji L.Deducing AS borders from IP path information.Ruan Jian Xue Bao/Journal of Software, 2010, 21(9):2387-2394(in Chinese with English abstract).http://www.jos.org.cn/1000-9825/3741.htm[doi:10.3724/SP.J.1001.2010.03741]
    [20] Luckie M, Dhamdhere A, Huffaker B, Clark D, Claffy KC.BDRmap:Inference of borders between IP networks.In:Proc.of the Internet Measurement Conf.2016.381-396.
    [21] Marder A, Smith JM.MAP-IT:Multipass accurate passive inferences from traceroute.In:Proc.of the Internet Measurement Conf.2016.397-411.
    [22] Marder A, Luckie M, Dhamdhere A, Huffaker B, Claffy KC, Smith JM.Pushing the boundaries with BDRmapIT:Mapping router ownership at Internet scale.In:Proc.of the Internet Measurement Conf.2018.56-69.
    [23] Ye T, Dey R, Liu Y, Ross KW.Topology mapping and geolocating for China's Internet.IEEE Trans.on Parallel & Distributed Systems, 2012, 24(9):1908-1917.[doi:10.1109/TPDS.2012.271].
    [24] Huffaker B, Fomenkov M, Claffy K.DRoP:DNS-based router positioning.ACM SIGCOMM Computer Communication Review, 2014, 44(3):5-13.[doi:10.1145/2656877.2656879]
    [25] CIDR report.http://www.cidr-report.org/as2.0/
    [26] Freedman MJ, Vutukuru M, Feamster N, Balakrishnan H.Geographic locality of IP prefixes.In:Proc.of the Internet Measurement Conf.2005.
    [27] Padmanabhan VN, Subramanian L.An investigation of geographic mapping techniques for Internet hosts.ACM SIGCOMM Computer Communication Review, 2001, 31(4):173-185.[doi:10.1145/964723.383073]
    [28] Moore D, Periakaruppan R, Donohoe J, Claff K.Where in the world is netgeo.caida.org? In:Proc.of the Int'l Networking Conf.2000.
    [29] Gharaibeh M, Shah A, Huffaker B, Zhang H, Ensafi R, Papadopoulos C.A look at router geolocation in public and commercial databases.In:Proc.of the Internet Measurement Conf.2017.463-469.
    [30] CA app synthetic monitor.https://asm.ca.com
    [31] PingPe.http://ping.pe/
    附中文参考文献
    [1] 张宇,方滨兴, 张宏莉.中国IP级网络拓扑测量与分析.通信学报, 2007, 28(12):96-101.[doi:10.3321/j.issn:1000-436x.2007.12.016]
    [2] 张宇,张宏莉, 方滨兴.Internet拓扑建模综述.软件学报, 2004, 15(8):1220-1226.http://www.jos.org.cn/1000-9825/15/1220.htm
    [3] 张宏莉, 方滨兴, 胡铭曾, 姜誉, 詹春燕, 张树峰.Internet测量与分析综述.软件学报, 2003, 14(1):110-116.http://www.jos.org.cn/1000-9825/14/110.htm
    [9] 王占丰, 冯径, 邢长友, 张国敏, 许博.IP定位技术的研究.软件学报, 2014, 25(7):1527-1540.http://www.jos.org.cn/1000-9825/4621.htm[doi:10.13328/j.cnki.jos.004621]
    [10] 朱金玉, 张宇,曾良伟, 余卓勋, 张宏莉.一种多接口路由器地理定位方法.信息安全学报, 2018, 3(4):15-24.[doi:10.19363/J.cnki.cn10-1380/tn.2018.07.02]
    [19] 魏镇韩, 陈鸣,赵洪华, 吉梁.从IP路径信息中推导AS边界.软件学报, 2010, 21(9):2387-2394.http://www.jos.org.cn/1000-9825/3741.htm[doi:10.3724/SP.J.1001.2010.03741]
    引证文献
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

朱金玉,张宇,曾良伟,张宏莉,方滨兴.地区网络边界发现方法.软件学报,2023,34(3):1512-1522

复制
相关视频

分享
文章指标
  • 点击次数:491
  • 下载次数: 1992
  • HTML阅读次数: 1954
  • 引用次数: 0
历史
  • 收稿日期:2020-09-09
  • 最后修改日期:2020-12-29
  • 在线发布日期: 2023-03-10
  • 出版日期: 2023-03-06
文章二维码
您是第20599369位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号