Design, implementation and formal verification of BGP proxy for mimic router
To ensure the safety and correctness of the critical ‘mimic bracket’ components such as protocol proxies of mimic routers, a BGP (border gateway protocol) proxy was designed and implemented, and formal methods were applied to verify the safety and correctness of the BGP proxy.The BGP packets communi...
| Published in: | Tongxin xuebao |
|---|---|
| Main Authors: | Jin ZHANG, Qiang GE, Weihai XU, Yiming JIANG, Hailong MA, Hongtao YU |
| Format: | Article |
| Language: | Chinese |
| Published: |
Editorial Department of Journal on Communications
2023-03-01
|
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2023065/ |
Similar Items
Design, implementation and formal verification of BGP proxy for mimic router
by: Jin ZHANG, et al.
Published: (2023-03-01)
by: Jin ZHANG, et al.
Published: (2023-03-01)
Implementation of auto failover on SD-WAN technology with BGP routing method on Fortigate routers at XYZ company
by: Lukman Medriavin Silalahi, et al.
Published: (2024-03-01)
by: Lukman Medriavin Silalahi, et al.
Published: (2024-03-01)
Implementation of auto failover on SD-WAN technology with BGP routing method on Fortigate routers at XYZ company
by: Lukman Medriavin Silalahi, et al.
Published: (2024-03-01)
by: Lukman Medriavin Silalahi, et al.
Published: (2024-03-01)
Flow scheduling technology based on BGP extended protocol
by: Yujia LUO, et al.
Published: (2016-03-01)
by: Yujia LUO, et al.
Published: (2016-03-01)
Flow scheduling technology based on BGP extended protocol
by: Yujia LUO, et al.
Published: (2016-03-01)
by: Yujia LUO, et al.
Published: (2016-03-01)
Study on BGP route leak
by: Jia JIA, et al.
Published: (2016-08-01)
by: Jia JIA, et al.
Published: (2016-08-01)
BGP robustness testing based on RFSM
by: WANG Le-chun, et al.
Published: (2005-01-01)
by: WANG Le-chun, et al.
Published: (2005-01-01)
BGP robustness testing based on RFSM
by: WANG Le-chun, et al.
Published: (2005-01-01)
by: WANG Le-chun, et al.
Published: (2005-01-01)
SD-BROV: An Enhanced BGP Hijacking Protection with Route Validation in Software-Defined eXchange
by: Pang-Wei Tsai, et al.
Published: (2021-06-01)
by: Pang-Wei Tsai, et al.
Published: (2021-06-01)
Quantitative analysis of BGP convergence and its influence on network performance
by: ZHAO Jin-jing, et al.
Published: (2007-01-01)
by: ZHAO Jin-jing, et al.
Published: (2007-01-01)
Quantitative analysis of BGP convergence and its influence on network performance
by: ZHAO Jin-jing, et al.
Published: (2007-01-01)
by: ZHAO Jin-jing, et al.
Published: (2007-01-01)
Demonstration of a photonic router via quantum walks
by: Huixia Gao, et al.
Published: (2023-01-01)
by: Huixia Gao, et al.
Published: (2023-01-01)
Topology Analysis of iBGP Confederation Case : Indonesia Research and Education Network (IdREN)
by: Irwin Wijaya Lahusen, et al.
Published: (2019-06-01)
by: Irwin Wijaya Lahusen, et al.
Published: (2019-06-01)
Architecture and practice of BGP internet routing visibility and security detection
by: Chaoyang YE, et al.
Published: (2021-12-01)
by: Chaoyang YE, et al.
Published: (2021-12-01)
Architecture and practice of BGP internet routing visibility and security detection
by: Chaoyang YE, et al.
Published: (2021-12-01)
by: Chaoyang YE, et al.
Published: (2021-12-01)
BGP Dataset-Based Malicious User Activity Detection Using Machine Learning
by: Hansol Park, et al.
Published: (2023-09-01)
by: Hansol Park, et al.
Published: (2023-09-01)
Formal Verification of STPA with Model Checking
by: Ryeonggu Kwon, et al.
Published: (2023-03-01)
by: Ryeonggu Kwon, et al.
Published: (2023-03-01)
Meaning and Vision of Mimic Computing and Mimic Security Defense
by: Jiangxing Wu
Published: (2014-07-01)
by: Jiangxing Wu
Published: (2014-07-01)
Meaning and Vision of Mimic Computing and Mimic Security Defense
by: Jiangxing Wu
Published: (2014-07-01)
by: Jiangxing Wu
Published: (2014-07-01)
Research progress of mimic multi-execution scheduling algorithm
by: Zhengbin ZHU, et al.
Published: (2021-05-01)
by: Zhengbin ZHU, et al.
Published: (2021-05-01)
Research progress of mimic multi-execution scheduling algorithm
by: Zhengbin ZHU, et al.
Published: (2021-05-01)
by: Zhengbin ZHU, et al.
Published: (2021-05-01)
SMACS: A framework for formal verification of complex adaptive systems
by: Fakhir Ilyas, et al.
Published: (2023-05-01)
by: Fakhir Ilyas, et al.
Published: (2023-05-01)
Automation of Formal Verification of Programs in the Pifagor Language
by: M. S. Ushakova, et al.
Published: (2015-08-01)
by: M. S. Ushakova, et al.
Published: (2015-08-01)
On the Implementation of a Formal Method for Verification of Scalable Cache Coherent Systems
by: Vladimir Burenkov
Published: (2018-10-01)
by: Vladimir Burenkov
Published: (2018-10-01)
Formal Verification of Business Constraints in Workflow-Based Applications
by: Florin Stoica, et al.
Published: (2024-12-01)
by: Florin Stoica, et al.
Published: (2024-12-01)
Microservice Security Framework for IoT by Mimic Defense Mechanism
by: Fei Ying, et al.
Published: (2022-03-01)
by: Fei Ying, et al.
Published: (2022-03-01)
Formulation and Evaluation of Transdermal Patches Containing BGP-15
by: Ildikó Bácskay, et al.
Published: (2023-12-01)
by: Ildikó Bácskay, et al.
Published: (2023-12-01)
Peningkatan Kompetensi Pegawai Balai Guru Penggerak (BGP) Sulawesi Tenggara Dalam Penerapan Infografis dengan Canva
by: Lilis Laome, et al.
Published: (2025-05-01)
by: Lilis Laome, et al.
Published: (2025-05-01)
Design and implementation of packet forwarding engine for reconfigurable routers
by: Yi-jiao CHEN, et al.
Published: (2012-08-01)
by: Yi-jiao CHEN, et al.
Published: (2012-08-01)
AN IMPLEMENTATION OF FIREWALL SYSTEM USING MIKROTIK ROUTER OS
by: Shaymaa W. Abdulatteef
Published: (2012-12-01)
by: Shaymaa W. Abdulatteef
Published: (2012-12-01)
Design and implementation of packet forwarding engine for reconfigurable routers
by: Yi-jiao CHEN, et al.
Published: (2012-08-01)
by: Yi-jiao CHEN, et al.
Published: (2012-08-01)
A Formal Modeling and Verification Method for Token Smart Contract
by: OUYANG Hengyi, XIONG Yan, HUANG Wenchao
Published: (2020-10-01)
by: OUYANG Hengyi, XIONG Yan, HUANG Wenchao
Published: (2020-10-01)
Design and Implementation of Router Remote Control System Supporting Static Route Summarization
by: Ali Ali
Published: (2009-03-01)
by: Ali Ali
Published: (2009-03-01)
Formal Verification of Fault-Tolerant Hardware Designs
by: Luis Entrena, et al.
Published: (2023-01-01)
by: Luis Entrena, et al.
Published: (2023-01-01)
Integrated Design Validation: Combining Simulation and Formal Verification for Digital Integrated Circuits
by: Lun Li, et al.
Published: (2006-04-01)
by: Lun Li, et al.
Published: (2006-04-01)
The Router’s Main Control unit Function Virtualization Based on Vmware
by: LI Wen-wei, et al.
Published: (2016-01-01)
by: LI Wen-wei, et al.
Published: (2016-01-01)
A Survey on Formal Verification and Validation Techniques for Internet of Things
by: Moez Krichen
Published: (2023-07-01)
by: Moez Krichen
Published: (2023-07-01)
Research on mimic decision method based on deep learning
by: Xiaohan YANG, et al.
Published: (2024-02-01)
by: Xiaohan YANG, et al.
Published: (2024-02-01)
Research on mimic decision method based on deep learning
by: Xiaohan YANG, et al.
Published: (2024-02-01)
by: Xiaohan YANG, et al.
Published: (2024-02-01)
Design and implementation of adaptive mimic voting device oriented to persistent connection
by: Dacheng ZHOU, et al.
Published: (2022-06-01)
by: Dacheng ZHOU, et al.
Published: (2022-06-01)
Similar Items
-
Design, implementation and formal verification of BGP proxy for mimic router
by: Jin ZHANG, et al.
Published: (2023-03-01) -
Implementation of auto failover on SD-WAN technology with BGP routing method on Fortigate routers at XYZ company
by: Lukman Medriavin Silalahi, et al.
Published: (2024-03-01) -
Implementation of auto failover on SD-WAN technology with BGP routing method on Fortigate routers at XYZ company
by: Lukman Medriavin Silalahi, et al.
Published: (2024-03-01) -
Flow scheduling technology based on BGP extended protocol
by: Yujia LUO, et al.
Published: (2016-03-01) -
Flow scheduling technology based on BGP extended protocol
by: Yujia LUO, et al.
Published: (2016-03-01)
