Tài liệu tham khảo |
Loại |
Chi tiết |
[1] O. Nordstrom and C. Dovrolis, “Beware of BGP attacks,” SIGCOMM Computer Communications Review (2004) |
Sách, tạp chí |
Tiêu đề: |
Beware of BGP attacks |
|
[2] T. Wan and P. Oorschot, “Analysis of BGP Prefix Origins During Google’s May 2005 Outage”, 2nd International Workshop on Security in Systems and Networks (2006) |
Sách, tạp chí |
Tiêu đề: |
Analysis of BGP Prefix Origins During Google’s May 2005 Outage |
|
[3] C. Labovitz, A. Ahuja, A. Bose and F. Jahanian, “Delayed Internet Routing Convergence”, ACM SIGCOMM (2000) |
Sách, tạp chí |
Tiêu đề: |
Delayed Internet Routing Convergence |
|
[4] S. Kent, C. Lynn and K. Seo, “Secure Border Gateway Protocol (S-BGP)” IEEE JSAC Special Issue on Network Security (2000) |
Sách, tạp chí |
Tiêu đề: |
Secure Border Gateway Protocol (S-BGP) |
|
[6] T. Wan, E. Kranakis and P. Oorschot, “Pretty Secure BGP (psBGP)”, 12th Annual Network and Distributed System Security Symposium (2005) |
Sách, tạp chí |
Tiêu đề: |
Pretty Secure BGP (psBGP) |
|
[7] J. Karlin and S. Forrest, “Pretty Good BGP: Protecting BGP by Cautiously Selecting Routes”, Technical Report TR-CS-2005-37, University of New Mexico (2005) |
Sách, tạp chí |
Tiêu đề: |
Pretty Good BGP: Protecting BGP by Cautiously Selecting Routes |
|
[8] A. Heffernan, “Protection of BGP Sessions via the TCP MD5 Signature Option” IETF RFC 2385 (1998) |
Sách, tạp chí |
Tiêu đề: |
Protection of BGP Sessions via the TCP MD5 Signature Option |
|
[9] A. Sridharan, Sue. Moon and C. Diot, “On the Correlation between Route Dynamics and Routing Loops”, Internet Measurement Conference (2003) |
Sách, tạp chí |
Tiêu đề: |
On the Correlation between Route Dynamics and Routing Loops |
|
[10] D. Pei, L. Zhang, X. Zhao and D. Massey, “A Study of BGP Path Vector Route Looping Behavior”, International Conference on Distributed Computing Systems ICDCS (2004) |
Sách, tạp chí |
Tiêu đề: |
A Study of BGP Path Vector Route Looping Behavior |
|
[11] S. Convery and M. Franz, “BGP Vulnerability Testing: Separating Fact from FUD”, NANOG28 Meeting (2003) |
Sách, tạp chí |
Tiêu đề: |
BGP Vulnerability Testing: Separating Fact from FUD |
|
[12] R. Mahajan, D. Wetherall and T. Anderson, “Understanding BGP Misconfiguration”, ACM SIGCOMM (2002) |
Sách, tạp chí |
Tiêu đề: |
Understanding BGP Misconfiguration |
|
[31] The National Laboratory for Applied Network Research (NLANR) http://www.nlanr.net/ |
Link |
|
[32] PlanetLab - A collection of machines distributed over the globe http://www.planet-lab.org/ |
Link |
|
[33] University of Oregon Route Views Project http://www.routeviews.org/ |
Link |
|
[34] Flow-tools – A software package for collecting and processing NetFlow data from Cisco and Juniper routers http://www.splintered.net/sw/flow-tools/ |
Link |
|
[35] Silktools - A suite of open source tools for monitoring large-scale networks using flow data http://silktools.sourceforge.net/ |
Link |
|
[36] Nfdump - Tools collect and process netflow data http://nfdump.sourceforge.net/ |
Link |
|
[37] Flowd - A small NetFlow collector http://www.mindrot.org/projects/flowd [38] Honeyd - A small daemon that creates virtual hosts on a network http://www.honeyd.org/ |
Link |
|
[41] IUCC/IDC Internet Telescope project http://www.ilan.net.il/research/telescope/ |
Link |
|
[42] NMAP - Free open source utility for network exploration or security auditing http://insecure.org/nmap/ |
Link |
|