參考文獻 |
[1] Dai KASHIEA, Eric Y. CHEN, Hitoshi FUJI, Shuichi MACHIDA, Hiroshi SEIGENO, Ken-ichi OKADA and Yutaka MATSUSHITA, “Active Countermeasure Platform against DDoS Attacks,” IEICE TRANS. INF. & SYST., vol. E85-D, no. 12, Dec. 2002.
[2] D. Moore, G..M. Voelker and S. Savage, “Inferring Internet denial-of-service activity,” Proceedings of 10th USENIX Security Symposium, 2001.
[3] D. Senie, “Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing,” RFC 2827, http://www.ietf.org/ rfc/rfc2827.txt, May 2000.
[4] D. Tennenhouse, J. Smith, W. Sincoskie, D. Wetherall and G.. Minden, “A Survey of Active Network Research,” IEEE Communication Magazine, vol. 135, no. 1, pp.80-86, Jan. 1997.
[5] David Wetherall, Ulana Legefza and John Guttag, “Introducing New Internet Services: Why and How,” IEEE NETWORK Magazine Special Issue on Active and Programmable Network, July 1998.
[6] Fadi al-moussa, “Active Networking Applied to Network Security,” 2nd Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, PGNet 2001. EPSRC, Liverpool John Moores University, ISBN:1 902560 078, pp147-151, June 2001.
[7] Active Network Backbone home page. http://www.isi.edu/abone.
[8] Bob Braden, Alberto Cerpa, Ted Faber, Bob Lindell, Graham Phillps, Jeff Kann and Vivek Shenoy, ”Introduction to the ASP Execution Environment (v1.6),“ Technical report, University of Southern California, Information Science Institute, http://www.isi.edu/active-signal/ARP/, Feb. 2003.
[9] David Wetherall, John Guttag and David Tennenhouse, “ANTS: A Toolkit for Building and Dynamically Deploying Network Protocols,” IEEE OPENARCH’98, pp. 117-129, San Francisco, CA, April 1998.
[10] Dan Sterne, Kelly Djahandari, Ravaindra Balupari, William La Cholter, Bill Babson, Brett Wilson, Priya Narasimhan and Andrew Purtell, “Active Network Based DDoS Defense,” Proceedings of DARPA Active Networks Conference and Exposition, pp. 193-203, Glenwood, MD, 2002.
[11] A. Hess, M. Jung, G. Schafer, ”FIDRAN: A Flexible Intrusion Detection and Response Framework for Active Networks,” Proceedings of Eighth International Symposium on Computers and Communication, Kemer, Antalya, Turkey, July 2003.
[12] J. Scambray, S. McClure and G.Kurtz, Hacking Exposed: Network Security Secrets & Solutions, Second Edition, McGraw Hill, 2001.
[13] W. Richard Stevens, TCP/IP Illustrated Volume 1 : The Protocols.
[14] CERT Advisory CA-1996-21 TCP SYN Flooding and IP Spoofing Attacks, http://www.cert.org/advisories/CA-1996-21.html.
[15] CERT Advisory CA-1996-01 UDP Port Denial-of-Service Attacks, http://www. cert.org/advisories/CA-1996-01.html.
[16] CERT Advisory CA-1996-26 Denial-of-Service Attack via ping, http://www. cert.org/advisories/CA-1996-26.html.
[17] CERT Advisory CA-1998-01 Smurf IP Denial-of-Service Attacks, http://www. cert.org/advisories/CA-1998-01.html.
[18] A. Barone, P. Chirco, G. Di Fatta and G. Lo Re, “A Management Architecture for Active Networks,” Proceedings of the Fourth Annual International Workshop on Active Middleware Services (AMS’02), Edinburgh, United Kingdom, July 2002.
[19] David Wetherall, John Guttag and David Tennenhouse, “ANTS: Network Services Without the Red Tape,” IEEE Computer Magazine, vol. 32, no. 4, April 1999.
[20] L.-D. Chou and S.-L. Wu, “Precautionary measures against TCP SYN flooding attack,” Proceedings of IFIP WCC 2000-World Computer Congress: The 15th International Conference on Information Security, Beijing, China, Aug. 2000.
[21] CERT Advisory CA-1997-28 IP Denial-of-Service Attacks, http://www. cert.org/advisories/CA-1997-28.html.
[22] D. Schnackenberg, K. Djahandari, and D. Sterne, “Infrastructure for intrusion detection and response,” Proceedings of DARPA Information Survivability Conference and Exposition (DISCEX '00), South Carolina, vol. 2, pp. 3-11, Jan. 2000.
[23] William La Cholter, Priya Narasimhan, Dan Sterne, Ravindra Balupari, Kelly Djahandari, Arvind Mani and Sandra Murphy, “IBAN: Intrusion Blocker based on Active Networks,” Proceedings of the DARPA Active Networks Conference and Exposition (DANCE’02), pp. 182-192, May 2002.
[24] Gitae Kim, Tony Bogovic and Dana Chee, “Active edge-Tagging (ACT): An Intruder Identification & Isolation Scheme in Active Network,” Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC'01), Hammamet, Tunisia, July 2001.
[25] John Ioannidis and Steven M. Bellovin, “Implementing Pushback: Router-Based Defense DDoS Attacks,” NDSS, Feb. 2002.
[26] Jelena Mirkovi´c, Gregory Prier and Peter Reiher, “Attacking DDoS at the Source,” Proceedings of 10th IEEE International Conference on Network Protocols (ICNP'02), pp. 312-321, Nov. 2002.
[27] Scott Shyne, Adam Hovak and Joseph Riolo, “Using Active Networking to Thwart Distributed Denial of Service Attacks,” Proceedings of 2001 IEEE Aerospace Conference, vol. 3, pp. 1103-1108, 2001.
[28] D. L. Tennenhouse, S.J. Garland, L. Shrira and M. F. Kaashoek, “From Internet to ActiveNet,” http://www.sce.carleton.ca/netmanage/activeNetworks/rfc96.html, Jan. 1996.
[29] D.Scott Alexander, B. Braden, C. Gunter, A. Jackson, A. Keromytis, G. Minden and D, Wetherall, “Active Network Encapsulation Protocol (ANEP),” Experimental RFC draft, July 1997.
[30] B. Barden, M. Hicks and C. Tschudin, “Active Network Overlay Network(ANON),” Experiment RFC draft, Dec. 1997.
[31] Rob Thomas, “Monitoring DoS Attacks with the VIP Console and NetFlow v1.0,” http://www.cymru.com/Documents/dos-and-vip.html, May 2001.
[32] David Harmelin, “Tackling Network DoS on Transit Networks,” http://www.dante.net/pubs/dip/42/42.html, March 2001.
[33] The Network Simulator, http://www.isi.edu/nsman/ns.
[34] K. Fall and K. Varadhan, “The ns Manual,” http://ww.isi/edu/ns, Dec. 2003.
[35] A. Barone, P. Chirco, G. Di Fatta, G. Lo Re, http://www.cere.pa.cnr. it/~difatta/ANgate/, July. 2004.
[36] Abocom Enterprise, http://www.aboway.com.tw/product_detail.php?id=58.
[37] Kerio WinRoute, http://www.leetide.net/support_kwf_008B14.htm. |