参考文献
[1] Dharmapurikar S, Paxson V. Robust TCP Stream Reassembly in the Presence of Adversaries[C]//Proc. of the 14th Conference on USENIX Security Symposium. Baltimore, USA: ACM Press, 2005.
[2] Thompson K, Miller G, Wilder R. Wide-area Internet Traffic Patterns and Characteristics[J]. IEEE Communications Society, 1997, 11(6): 10-23. (下转第90页)
(上接第86页)
[3] Kim H, Kim J H, Kang I, et al. Preventing Session Table Explosion in Packet Inspection Computers[J]. IEEE Transactions on Computers, 2005, 54(2): 238-240.
[4] Song Haoyu, Dharmapurikar S, Turner J, et al. Fast Hash Table Lookup Using Extended Bloom Filter: An Aid to Network Processing[J]. ACM SIGCOMM Computer Com- munication Review, 2005, 35(4): 181-192.
[5] Li Xin, Ji Zhengzhou, Hu Mingzeng. Stateful Inspection Firewall Session Table Processing[J]. International Journal of Information Technology, 2005, 11(2): 21-30.
[6] Roesch M. Snort-lightweight Intrusion Detection for Net- works[C]//Proc. of the 13th USENIX Conference on System Administration. Seattle, USA: ACM Press, 1999.
[7] Paxson V. Bro: A System for Detecting Network Intruders in Real Time[J]. Computer Networks, 1999, 31(23): 2435-2463.
[8] 熊 兵, 廖年冬, 李 峰, 等. 基于网络数据流局部性的连接管理优化方法[J]. 计算机工程, 2011, 37(24): 86-87, 90.
[9] Oh J, Kim B, Yoon S, et al. Architecture and Mechanisms for Implementing an FPGA-based Stateful Intrusion Detection System[J]. International Journal of Computer Science and Network Security, 2007, 7(5): 110-117.
[10] Yoon S, Kim B, Oh J, et al. High Performance Session State Management Scheme for Stateful Packet Inspection[C]//Proc. of the 10th Asia-Pacific Conference on Network Operations and Management Symposium: Managing Next Generation Networks and Services. Berlin, Germany: Springer-Verlag, 2007.
[11] 熊 兵. 高速网络数据流分析的若干问题研究[D]. 武汉: 华中科技大学, 2009.
编辑 任吉慧 |