[1]毕军,王优,冷晓翔. IPv6过渡研究综述[J]. 电信科学,2008,24(10): 12-22.[2]BAKER F,毕军,殷康. IPv4/IPv6的共存、过渡与寻址[J]. 电信科学,2008,24(10): 30-37.[3]BELLOVIN S, TAYLOR T. RFC 2026, ICMP traceback messages [S]. [S.l.]: IETF, 2003.[4]WU S F, ZHANG L X, MASSEY D, et al. draft-wu-itrace-intention-00, Intention-driven ICMP traceback[S].[S.l.]: IETF, 2001.[5]SAVAGE S, WETHERALL D, KARKIN A, et al.Practical network support for IP traceback [C]// ACM Special Interest Group Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication. New York: ACM Press, 2000: 295-306.[6]BELENKY A, ANSARI N. Tracing multiple attackers with Deterministic Packet Marking (DPM) [C]// IEEE Pacific Rim Conference on Communications, 2003. New York: IEEE, 2003: 49-52.[7]BELENKY A, ANSARI N. IP traceback with deterministic packet marking [J]。 IEEE Communications Letters, 2003, 7(4): 162-164.[8]SNOEREN A C, PARTRIDGE C, SANCHEZ L A, et al.Hash-based IP traceback [C]// SIGCOMM’01. New York: ACM Press, 2001:3-14.[9]SNOEREN A C, PARTRIDGE C, SANCHEZ L A, et al. Single-packet IP traceback [J]. IEEE/ACM Transactions on Networking, 2002, 10(6): 721-734.[10]FERGUSON P, SENIE D. RFC 2267, Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing[S].[S.l.]: IETF, 1998.[11]STONE R. CenterTrack: an IP overlay network for tracking DoS floods [C]// Proceedings of the 9th USENIX Security Symposium, 2000. Berkley: USENIX, 2000:199-212.[12]BURCH H, CHESWICK B. Tracing anonymous packets to their approximate source [C]// USENIX LISA ’00. Berkley: USENIX, 2000: 319-327.[13]WU J P, BI J, LI X, et al. RFC 5210, A Source Address Validation Architecture (SAVA) testbed and deployment experience [S]. [S.l.]: IETF, 2008.[14]吴建平,任罡,李星. IPv6网络自治系统间源地址验证技术研究[J]. 中国科技论文在线,2007,2(10): 715-719.[15]吴建平,毕军. 可信任的下一代互联网及其发展[J].中兴通讯技术,2008,14(1): 8-12.[16]吴建平,任罡,李星. 构建基于真实IPv6源地址验证体系结构的下一代互联网[J]. 中国科学: 信息科学,2008,38(10):1583-1593.[17]GILLIGAN R, NORDMARK E. RFC 2893, Transition mechanisms for IPv6 hosts and routers [S]. [S.l.]: IETF, 2000.[18]TSIRTSIS G, SRISURESH P. RFC 2766, Network Address Translation-protocol Translation (NAT-PT) [S].[S.l.]: IETF, 2000.[19]HAGEN S. IPv6精髓[M]. 北京: 清华大学出版社, 2004.[20]SRISURESH P, EGEVANG K. RFC 3022, Traditional IP network address translator (traditional NAT) [S].[S.l.]: IETF, 2001.[21]BAGNULO M, MATTHEWS P, BEIJNUM I V. RFC 6146, Stateful NAT64: network address and protocol translation from IPv6 clients to IPv4 servers [S].[S.l.]: IETF, 2011.[22]NORDMARK E. RFC2765, Stateless IP/ICMP Translation Algorithm (SIIT) [S]. [S.l.]: IETF,2000.[23]LI X, BAO C X, CHEN M K, et al. RFC 6219, The China Education and Research Network (CERNET) IVI translation design and deployment for the IPv4/IPv6 coexistence and transition (IVI) [S].[S.l.]: IETF, 2011.[24]MANKIN A, MASSEY D, WU C L, et al. On design and evaluation of “intention-driven” ICMP traceback[C]// IEEE 10th International Conference on Computer Communications and Networks. New York: IEEE, 2001: 159-165.[25]BURCH H, CHESWICK B. Tracing anonymous packets to their approximate source [C]// Conference: USENIX Systems Administration Conference - LISA. Berkley: USENIX, 1999:319-327.[26]SAGER G. Presentation at the Internet 2 working group: security fun with Ocxmon and Cflowd [R]. San Diego: Pacific Institute for Computer Security, 1998.[27]STRAYER W T, JONES C E,TCHAKOUNTIO F, et al. SPIE-IPv6: Single IPv6 Packet Traceback [C]// LCN'04: Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks. Washington, DC: IEEE Computer Society, 2004:118-125. |