Design, implementation and formal verification of BGP proxy for mimic router
To ensure the safety and correctness of the critical ‘mimic bracket’ components such as protocol proxies of mimic routers, a BGP (border gateway protocol) proxy was designed and implemented, and formal methods were applied to verify the safety and correctness of the BGP proxy.The BGP packets communi...
Saved in:
| Main Authors: | Jin ZHANG, Qiang GE, Weihai XU, Yiming JIANG, Hailong MA, Hongtao YU |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2023-03-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2023065/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Flow scheduling technology based on BGP extended protocol
by: Yujia LUO, et al.
Published: (2016-03-01) -
Study on BGP route leak
by: Jia JIA, et al.
Published: (2016-08-01) -
BGP robustness testing based on RFSM
by: WANG Le-chun, et al.
Published: (2005-01-01) -
Automation of Formal Verification of Programs in the Pifagor Language
by: M. S. Ushakova, et al.
Published: (2015-08-01) -
Meaning and Vision of Mimic Computing and Mimic Security Defense
by: Jiangxing Wu
Published: (2014-07-01)