參考文獻 |
中文參考文獻
[1] 朱永彤,「基於 OpenFlow 交換機之跨雲端安全管理機制研究」,國立中央大學資訊管理學系碩士論文,2013。
[2] 許景涵,「以 NetFPGA 實作結合 NFA 及 AC 演算法之網路型入侵偵測系統」,國立中央大學資訊管理學系碩士論文,2011。
[3] 黃俊嘉,「利用 NetFPGA 建置一可虛擬化網路之研究」,國立成功大學電腦與通信工程研究所碩士論文,2011。
[4] 黃勝獅,「使用 OpenFlow Switch 分析偵測殭屍網路」,國立中央大學資訊工程研究所碩士論文,2011。
[5] 彭士家,「使用 OpenFlow 交換器偵測 Botnet 受害者與通知機制」,國立中央大學資訊工程研究所碩士論文,2010。
[6] 黃文源,胡仁維,劉德隆,「未來網路跨網域流量檢視機制研發」, TANET 2012網際網路研討會,銘傳大學,桃園,2012。
英文參考文獻
[7] “Middlebox,” Wikipedia, the free encyclopedia. 16-Feb-2014.
[8] B. Carpenter and S. Brim, “Middleboxes: Taxonomy and issues,” RFC 3234, February, 2002.
[9] J. Sherry, S. Hasan, C. Scott, A. Krishnamurthy, S. Ratnasamy, and V. Sekar, “Making middleboxes someone else’s problem: network processing as a cloud service,” in Proceedings of ACM SIGCOMM Comput. Commun. Rev., Vol. 42, No. 4, pp. 13–24, 2012.
[10] J. Lee, J. Tourrilhes, P. Sharma, and S. Banerjee, “No more middlebox: integrate processing into network,” in Proceedings of ACM SIGCOMM Comput. Commun. Rev., Vol. 40, No. 4, pp. 459–460, 2010.
[11] A. Gember, P. Prabhu, Z. Ghadiyali, and A. Akella, “Toward software-defined middlebox networking,” in Proceedings of the 11th ACM Workshop on Hot Topics in Networks, pp. 7–12, 2012.
[12] D. A. Joseph, A. Tavakoli, and I. Stoica, “A policy-aware switching layer for data centers,” in Proceedings of ACM SIGCOMM Computer Communication Review, Vol. 38, pp. 51–62, 2008.
[13] V. Sekar, N. Egi, S. Ratnasamy, M. K. Reiter, and G. Shi, “Design and implementation of a consolidated middlebox architecture,” in Proceedings of NSDI, 2012.
[14] V. Sekar, S. Ratnasamy, M. K. Reiter, N. Egi, and G. Shi, “The middlebox manifesto: enabling innovation in middlebox deployment,” in Proceedings of the 10th ACM Workshop on Hot Topics in Networks, 2011.
[15] G. Gibb, H. Zeng, and N. McKeown, “Initial thoughts on custom network processing via waypoint services,” in Proceedings of the 3rd Workshop on Infrastructures for Software/Hardware co-design, 2011.
[16] Z. A. Qazi, C.-C. Tu, L. Chiang, R. Miao, V. Sekar, and M. Yu, “vSwitch,”in Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, 2013.
[17] G. Gibb, H. Zeng, and N. McKeown, “Outsourcing network functionality,” in Proceedings of the first workshop on Hot topics in software defined networks, pp. 73–78, 2012.
[18] O. M. E. Committee, “Software-Defined Networking: The New Norm for Networks,” ONF White Pap. Palo Alto US Open Netw. Found., 2012.
[19] “Software-defined networking,” Wikipedia, the free encyclopedia. 24-Feb-2014.
[20] G. Lefebvre, E. Rubow, and R. Manghirmalani, “Chaining of inline services using software defined networking, ” Google Patents, 2012.
[21] S. K. Fayazbakhsh, L. Chiang, V. Sekar, M. Yu, and J. C. Mogul, “Enforcing network-wide policies in the presence of dynamic middlebox actions using FlowTags,” in Proceedings of NSDI, 2014.
[22] S. K. Fayazbakhsh, V. Sekar, M. Yu, and J. C. Mogul, “FlowTags: enforcing network-wide policies in the presence of dynamic middlebox actions,” in Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, pp. 19–24, 2013.
[23] N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner, “OpenFlow: enabling innovation in campus networks,” in Proceedings of ACM SIGCOMM Comput. Commun. Rev., Vol. 38, No. 2, pp. 69–74, 2008.
[24] J. Naous, D. Erickson, G. A. Covington, G. Appenzeller, and N. McKeown, “Implementing an OpenFlow switch on the NetFPGA platform,” in Proceedings of the 4th ACM/IEEE Symposium on Architectures for Networking and Communications Systems, pp. 1–9, 2008.
[25] R. Braga, E. Mota, and A. Passito, “Lightweight DDoS flooding attack detection using NOX/OpenFlow,” in Proceedings of Local Computer Networks (LCN), 2010 IEEE 35th Conference on, pp. 408–415, 2010.
[26] J. Jin, C. Im, and S. Y. Nam, “Mitigating HTTP GET Flooding Attacks through Modified NetFPGA Reference Router,” 2010
[27] N. Gude, T. Koponen, J. Pettit, B. Pfaff, M. Casado, N. McKeown, and S. Shenker, “NOX: towards an operating system for networks,” in Proceedings of ACM SIGCOMM Comput. Commun. Rev., Vol. 38, No. 3, pp. 105–110, 2008.
[28] S. Rajagopalan, D. Williams, H. Jamjoom, and A. Warfield, “Split/merge: system support for elastic execution in virtual middleboxes,” in Proceedings of USENIX conference on Networked Systems Design and Implementation (NSDI), 2013.
[29] J. W. Anderson, R. Braud, R. Kapoor, G. Porter, and A. Vahdat, “xOMB: Extensible open middleboxes with commodity servers,” in Proceedings of the eighth ACM/IEEE symposium on Architectures for networking and communications systems, pp. 49–60, 2012.
[30] S. Shin and G. Gu, “CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?),” in Proceedings of Network Protocols (ICNP), 2012 20th IEEE International Conference on, pp. 1–6, 2012.
[31] A. Lara, A. Kolasani, and B. Ramamurthy, “Simplifying network management using Software Defined Networking and OpenFlow,” in Proceedings of Advanced Networks and Telecommuncations Systems (ANTS), 2012 IEEE International Conference on, pp. 24–29, 2012.
[32] A. Al-Shabibi, “MultiPaths Revisited-A novel approach using OpenFlow-enabled devices,” 2011.
[33] M. Sniedovich, “Dijkstra’s algorithm revisited: the dynamic programming connexion,” Control Cybern., Vol. 35, pp. 599–620, 2006.
[34] J. Moy, “OSPF version 2,” 1997.
[35] J. Soeurt and I. Hoogendoorn, “Shortest path forwarding using OpenFlow,” Tech. rep.(February 2012), 2012.
相關網站
[36] “World Enterprise Network and Data Security Markets.” [Online]. Available: http://www.businesswire.com/news/home/20110110006441/en/Enterprise-Network-Data-Security-Spending-Shows-Remarkable#.U7EEGfmSx0w.
[37] O. S. Specification, “Version 1.0. 0.[Electronic resource],” [Online]. Available: http://www.OpenFlow.org/documents/OpenFlow-spec-v1.0.0.pdf.
[38] “NetFPGA.” [Online]. Available: http://netfpga.org/.
[39] “NOXRepo:NOX API.” [Online]. Available: http://noxrepo.org/.
[40] “IEEE 802.1AB (LLDP) Specification.” [Online]. Available: http://standards.ieee.org/getieee802/download/802.1AB-2009.pdf.
[41] “Dijkstra’s algorithm - Representing the Graph.” [Online]. Available: http://lostincompilation.blogspot.tw/2013/04/dijkstras-algorithm-part-1-tutorial.html.
[42] “noxrepo - NOX Installation,” GitHub. [Online]. Available: https://github.com/noxrepo/nox-classic.
[43] “CentOS NetFPGA Install.” [Online]. Available: http://archive.OpenFlow.org/wk/index.php/CentOS_NetFPGA_Install.
[44] “Snort.” [Online]. Available: http://www.snort.org/.
[45] “iptables,” Wikipedia, the free encyclopedia. 16-Feb-2014.
[46] “Colasoft Packet Builder.” [Online]. Available: http://www.colasoft.com/packet_builder/.
[47] Google Sets New Internet Traffic Record. [Online]. Available: http://ddos.arbornetworks.com/2010/10/google-breaks-traffic-record/
|