參考文獻 |
[1] Troubleshooting the network survey. http://eastzone.github.com/atpg/docs/NetDebugSurvey.pdf, 2012.
[2] Z. Kerravala. As the value of enterprise networks escalates, so does the need for configuration management. Enterprise Computing and Networking, The Yankee Group, January 2004.
[3] Openflow. https://www.opennetworking.org/index.php.
[4] Nox. http://www.noxrepo.org/.
[5] Floodlight. http://www.projectfloodlight.org/floodlight/.
[6] Ryu. http://osrg.github.io/ryu/.
[7] Haohui Mai, Ahmed Khurshid, Rachit Agarwal, Matthew Caesar, P. Brighten Godfrey, and Samuel Talmadge King. Debugging the data plane with anteater. In Proceedings
of the 2011 ACM Conference on SIGCOMM, SIGCOMM ’11, pages 290–301, New York, NY, USA, 2011. ACM.
[8] Nick Feamster and Hari Balakrishnan. Detecting bgp configuration faults with static analysis. In Proceedings of the 2nd USENIX Conference on Networked Systems Design and Implementation, NSDI’05, pages 43–56, Berkeley, CA, USA, 2005. USENIX Association.
[9] Peyman Kazemian, George Varghese, and Nick McKeown. Header space analysis: Static checking for networks. In Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation, NSDI’12, pages 9–9, Berkeley, CA, USA, 2012. USENIX Association.
[10] A.X. Liu and A.R. Khakpour. Quantifying and verifying reachability for access controlled networks. Networking, IEEE/ACM Transactions on, 21(2):551–565, April 2013.
[11] Hongyi Zeng, P. Kazemian, G. Varghese, and N. McKeown. Automatic test packet generation. Networking, IEEE/ACM Transactions on, 22(2):554–566, April 2014.
[12] Peyman Kazemian, Michael Chang, Hongyi Zeng, George Varghese, Nick McKeown, and Scott Whyte. Real time network policy checking using header space analysis. In Proceedings of the 10th USENIX Conference on Networked Systems Design and Implementation, NSDI’13, pages 99–112, Berkeley, CA, USA, 2013. USENIX Association.
[13] Ahmed Khurshid, Xuan Zou, Wenxuan Zhou, Matthew Caesar, and P. Brighten Godfrey. Veriflow: Verifying network-wide invariants in real time. In Proceedings of
the 10th USENIX Conference on Networked Systems Design and Implementation, NSDI’13, pages 15–28, Berkeley, CA, USA, 2013. USENIX Association.
[14] Z.M. Mao, D. Johnson, J. Rexford, J. Wang, and R. Katz. Scalable and accurate identification of as-level forwarding paths. In INFOCOM, 2004 Proceedings IEEE,
volume 3, pages 1605–1615 vol.3, March 2004.
[15] G.G. Xie, Jibin Zhan, D.A. Maltz, Hui Zhang, Albert Greenberg, G. Hjalmtysson, and J. Rexford. On static reachability analysis of ip networks. In INFOCOM, 2005
Proceedings IEEE, volume 3, pages 2170–2183 vol. 3, March 2005.
[16] A.X. Liu and M.G. Gouda. Diverse firewall design. Parallel and Distributed Systems, IEEE Transactions on, 19(9):1237–1251, Sept 2008.
[17] Huan Liu. Efficient mapping of range classifier into ternary-cam. In High Performance Interconnects, 2002. Proceedings. 10th Symposium on, pages 95–100, 2002.
[18] J. van Lunteren and T. Engbersen. Fast and scalable packet classification. Selected Areas in Communications, IEEE Journal on, 21(4):560–571, May 2003.
[19] A. Bremler-Barr, D. Hay, and D. Hendler. Layered interval codes for tcam-based classification. In INFOCOM, 2009 Proceedings IEEE, pages 1305–1313, April 2009.
[20] D.-Y. Chang and P.-C. Wang. Tcam-based multi-match packet classification using multidimensional rule layering. Networking, IEEE/ACM Transactions on, PP(99): 1–14, 2015.
[21] Yeim-Kuan Chang, Cheng-Chien Su, Yung-Chieh Lin, and Sun-Yuan Hsieh. Efficient gray-code-based range encoding schemes for packet classification in tcam. Networking, IEEE/ACM Transactions on, 21(4):1201–1214, Aug 2013.
[22] A. Bremler-Barr and D. Hendler. Space-efficient tcam-based classification using gray coding. In INFOCOM, 2007 Proceedings IEEE, pages 1388–1396, May 2007.
[23] V. Srinivasan, G. Varghese, S. Suri, and M. Waldvogel. Fast and scalable layer four switching. SIGCOMM Comput. Commun. Rev., 28(4):191–202, October 1998.
[24] David E. Taylor. Survey and taxonomy of packet classification techniques. ACM Comput. Surv., 37(3):238–275, September 2005.
[25] Haoyu Song and J.S. Turner. Toward advocacy-free evaluation of packet classification algorithms. Computers, IEEE Transactions on, 60(5):723–733, May 2011.
[26] Header space library and netplumber.http://bitbucket.org/peymank/hassel-public/.
[27] Martin Roesch. Snort - lightweight intrusion detection for networks. In Proceedings of the 13th USENIX Conference on System Administration, LISA ’99, pages 229–238, Berkeley, CA, USA, 1999. USENIX Association.
[28] D.E. Taylor and J.S. Turner. Classbench: a packet classification benchmark. In INFOCOM, 2005 Proceedings IEEE, volume 3, pages 2068–2079 vol. 3, March 2005. 40 |