|
[1] Clyde R.A.(2002),「資安著重管理架構」,資訊傳真週刊,第352期,2002年11月,第46-47頁。 [2] 立駭科技(2000),「資訊安全委外服務研究」,資訊與電腦,第257期,2000年12月,第33-38頁。 [3] 吳宗磻(1996),「政府機構資訊系統安全稽核制度」,存款保險資訊季刊,1996年,第10卷,第2期,第21-40頁。 [4] M. Adiletta, M. Rosenbluth, D. Bernstein, G. Wolrich and H. Wilkinson(2002), "The next generation of Intel IXP network processors", Intel Technology Journal, August 2002, Vol. 6, No. 3, pp.6-18. [5] N. Ansari and A. Belenky(2003), “IP traceback with Deterministic Packet Marking”, IEEE. Communications Letters, April 2003, Vol. 7, No. 4, pp. 162-164. [6] A. Belenky, N. Ansari and N. Jersey(2003), “On IP Traceback”, IEEE Communications Magazine, July 2003, Vol. 41, No. 7, pp.142-153. [7] S. M. Bellovin(1996), "Problem Areas for the IP Security Protocols", Proceedings of the Sixth Usenix Unix Security Symposium, San Jose, CA., pp. 1-16. [8] S. Bellovin(2000), “ICMP Traceback Messages” Internet Draft, March 2000. [9] L. S. Brakmo and L. Peterson(1995), "TCP Vegas: End to End Congestion Avoidance on a Global Internet", IEEE Journal on Selected Areas in Communication, 13(8): 14651480. [10]M. Bykova, S. Ostermann and B. Tjaden(2001), ”Detecting network intrusions via a statistical analysis of network packet characteristics”, Proceedings of the 33rd Southeastern Symposium on System Theory, pp. 309-314. [11]J. B. D. Caberera, B. Ravichandran and R. K. Mehra(2000), “Statistical traffic modeling for network intrusion detection”, Proceedings of the 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, 2000, pp. 466-473. [12] M. Christiansen, K. Jeffay, D. Ott and F. D. Smith(2000), "Tuning RED for Web traffic", Proceedings of ACM SIGCOMM, Stockholm, Sweden, 1391 S0. Firoiu V., Borden M.(2000), "A study of active queue management for congestion control”, Proceedings of INFOCOM 2000, Tel Aviv, Israel, 14351444. [13]DECÒ(1982), "The Ethernet - A Local Area Network: Data Link Layer and Physical Layer Specifications", DigitalÒ, IntelÒ and XeroxÒ, November 1982. [14]IntelÒ, “IntelÒ IXP2400 Network Processor: Flexible, High-Performance Solution for Access and Edge Applications”, http://www.intel.com/design/network/papers/ixp2400.pdf. [15]IntelÒ(2003), “IntelÒ Internet Exchange Architecture Software Development Kit: Tools Installation Guide”, November 2003. [16]IntelÒ(2004), “IXP2400 Network Processor Hardware Reference Manual”, Oct 2004. [17]C. Jin, H. Wang and K. G. Shin(2003), “Hop-count filtering: an effective defense against spoofed DDoS traffic”, Conference on Computer and Communications Security archive, Proceedings of the 10th ACM conference on Computer and communications security, October 27-30 2003, Washington D.C., USA, pp.30-41. [18]J. Jung, B. Krishnamurthy, and M. Rabinovich(2002), “Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites”, the Eleventh International World Wide Web Conference, Honolulu, Hawaii, pp.252-262. [19]Y. Kim, W. C. Lau, M. C. Chuah and H. J. Chao(2004), “Packetscore: statistics-based overload control against distributed denial-of-service attacks”, INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies, Vol. 4, No. 7-11, pp.2594-2604. [20]K. Lahiri, A. Raghunathan and S. Dey(2001), "System level performance analysis for designing on-chip communication architectures", IEEE Transactions on Computer Aided-Design of Integrated Circuits and Systems, 20(6):768783. [21]W. Lee, S. J. Stolfo and K. W. Mok(1999), ”A data mining framework for building intrusion detection models”, Security and Privacy, Proceedings of the IEEE Symposium on 1999, pp.120-132. [22]B. P. Lim and M. S. Uddin(2005), “Statistical-Based SYN-Flooding Detection Using Programmable Network Processor”, Decision and Control, 2005 and 2005 European Control Conference. CDC-ECC ''05. 44th IEEE Conference on 12-15 Dec., pp.7347-7351. [23]Y. N. Lin, C. H. Lin, Y. D. Lin and Y. C. Lai(2005), “VPN Gateways over Network Processors: Implementation and Evaluation”, Proceedings of the 11th IEEE Real Time and Embedded Technology and Applications Symposium(RTAS’05), pp. 480-486. [24]R. Ramaswamy, N. Weng and T. Wolf(2005), “A network processor based passive measurement node”, Proc. of Passive and Active Measurement Workshop(PAM), Mar. 2005, pp. 337-340, (Extended Abstract). [25]C. Siaterlis and V. Maglaris(2005),.“Detecting incoming and outgoing DDoS attacks at the edge using a single set of network characteristics”, IEEE Symposium on 27-30 June, pp.469-475. [26]T. Verdickt, W. V. d. Meerssche and K. Vlaeminck(2005), “Modeling the Performance of a NAT/Firewall Network Service for the IXP2400”, Proceedings of the Fifth International Workshop on Software and Performance, WOSP 2005, Palma, Illes Balears, Spain, July 12-14, pp.137-144.
|