參考文獻 |
[1]CERT Advisory CA-1996-21 TCP SYN Flooding and IP Spoofing Attacks, http://www.cert.org/advisories/CA-1996-21.html
[2]CERT Advisory CA-1996-26 Denial-of-Service Attack via ping, http://www.cert.org/advisories/CA-1996-26.html
[3]CERT Advisory CA-1996-01 UDP Port Denial-of-Service Attack, http://www.cert.org/advisories/CA-1996-01.html
[4]CERT Advisory CA-1998-01 Smurf IP Denial-of-Service Attacks, http://www.cert.org/advisories/CA-1998-01.html
[5]DDoS attack tool timeline, http://staff.washington.edu/dittrich/talks/sec2000/ timeline.html
[6]A.S. Tanenbaum, Computer Networks, Prentice-Hall International, Inc, pp 413-416, pp 524-536, 1996.
[7]CERT Incident Note IN-99-07, http://www.cert.org/incident_notes/ IN-99-07.html
[8]CERT Incident Note IN-2000-05, http://www.cert.org/incident_notes/ IN-2000-05.html
[9]S.-L. Wu and L.-D. Chou, "Simulations for solutions of TCP SYN flooding attacks," Proceedings of the Eighth National Conference on Information Security, Kaoshong, Taiwan, R.O.C., pp. 71-79, May 1998.
[10]L.-D. Chou and S.-J. Fong, "Preventive strategies to reduce the effect of TCP SYN flooding attack," Proceedings of the 2nd Conference on Information Management and Its Application in Law Enforcement, Taoyuan, Taiwan, R.O.C., pp. 91-96, May 1997.
[11]L.-D. Chou and S.-L. Wu, "Precautionary measures against TCP SYN flooding attacks," Proceedings of IFIP WCC 2000-World Computer Congress: The 15th International Conference on Information Security, Beijing, China, Aug. 2000.
[12]Policing and Shaping Overview, http://www.cisco.com/univercd/cc/td/doc /product /software/ios120/12cgcr/qos_c/qcpart4/index.htm.
[13]呂維毅, ATM網路新世紀 實務進階篇, 和碩科技, pp. 26-40, Aug. 1996.
[14]N.A. Noureldien and I.M. Osman, "A stateful inspection module architecture," TENCON 2000. Proceedings, Vol. 2, pp 259-265, 24-27 Sept. 2000.
[15]CheckPoint FireWall-1 Technical Overview, http://www.checkpoint.com/ products/firewall-1/.
[16]X. Geng and A.B. Whinston, "Defeating distributed denial of service attacks, " IT Professional, pp 36-42, July-Aug. 2000.
[17]S.-K. Huang, "防止攻擊跳板主機的安全管理策略," 2000 年第二屆網際空間:資訊、法律與社會, Dec 2000, pp. 121-127.
[18]The NetBSD Packages Collection: security/ddos-scan, http://www.jp.netbsd.org/ ja/JP/Documentation/Packages/list/security/ddos-scan/README.html
[19]18 February, 2000 Detect DDoS Components, http://www2.axent.com/ swat/index.cfm
[20]D. Senie, "Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing," RFC 2827, http://www.ietf.org/rfc/ rfc2827.txt, May 2000.
[21]H.F. Lipson and D.A. Fisher, "A New Technical and Business Perspective on Security," Proceedings of the 1999 New Security Paradigms Workshop, Caledon Hills, Ontario, Canada, September 22-24, 1999.
[22]P. Bellavista, A. Corradi and C. Stefanelli, "An integrated management environment for network resources and services," IEEE Journal on Selected Areas in Communications, Vol. 188, No. 5, pp 676-685, May 2000.
[23]M.G. Ceruti, "Mobile agents in network-centric warfare", Proceedings of 5th International Symposium on Autonomous Decentralized Systems, pp. 243-246, 26-28 Mar. 2001.
[24]P. Marques, P. Simoes, L. Silva, F. Boavida and J. Silva, "Providing applications with mobile agent technology," Open Architectures and Network Programming Proceedings, pp 129-136, 2001 IEEE, 2001.
[25]P. Bellavista, A. Corradi and C. Stefanelli, "CORBA solutions for interoperability in mobile agent environments," Proceedings of the International Symposium on Distributed Objects and Applications, DOA '00., pp 283-292, 21-23 Sept. 2000.
[26]GMD FOKUS, and IBM Corp, Mobile Agent Facility Specification, Joint Submission supported by Crystaliz Inc., General Magic Inc., the Open Group, OMG TC Document orbos/98-03-09, ftp://ftp.omg.org/pub/docs/orbos/98-03-09.pdf.
[27]H. Reiser and G. Vogt, "Threat analysis and security architecture of mobile agent based management systems," Proceedings of Network Operations and Management Symposium, pp. 979-980, 10-14 Apr. 2000.
[28]F. Hohl, "A framework to protect mobile agents by using reference states," Proceedings of 20th International Conference on Distributed Computing Systems, 2000, pp. 410 - 417, 10-13 Apr. 2000.
[29]J.-H. Wang, J.-P. Hu and K. Hu, "Security design of mobile agent system," Proceedings of Workshop on Database and Expert Systems Applications, pp. 426 - 430, 4-8 Sept. 2000.
[30]J.-Y. Park, D.-I. Lee and H.-H. Lee, "Data protection in mobile agents; one-time key based approach", Proceedings of 5th International Symposium on Autonomous Decentralized Systems, pp. 411-418, 26-28 Mar. 2001.
[31]D'Agents Software Release 2.0, http://agent.cs.dartmouth.edu/software /agent2.0/
[32]The TACOMA project, http://www.tacoma.cs.uit.no/
[33]Voyager overview, http://www.objectspace.com/products/voyager/
[34]Concordia Technology - At a Glance, http://www.concordiaagents.com /documents.htm
[35]Grasshopper-The Agent Platform, http://www.grasshopper.de/
[36]Y.-W. Chen, K.-S. Hsiang and T.-Y. Hsieng, "Study on the Prevention of SYN Flooding by Using Traffic Policing," Proceedings of Network Operations and Management Symposium, Hawaii, pp. 593-604, April, 2000.
[37]R. Caceres, N. Duffield, A. Feldmann, J.D. Friedmann, A. Greenberg, R. Greer, T. Johnson, C.R. Kalmanek, B. Krishnamurthy, D. Lavelle, P.P. Mishra, J. Rexford, K.K. Ramakrishnan, F.D. True and J.E. van der Merwe, "Measurement and analysis of IP network usage and behavior," IEEE Communications Magazine, Vol. 38, No. 5, pp 141-151, May 2000.
[38]WinPcap: the Free Packet Capture Architecture for Windows, http://netgroup -serv.polito.it/winpcap
[39]WinDump: tcpdump for Windows, http://netgroup-serv.polito.it/windump/
[40]Cabletron Systems, SSR8 CLI Reference Manual.
[41]IBM Aglets Software Development Kit, http://www.trl.ibm.com/aglets. |