|
[1] "告別2007 駭客「產業」隱然成形", Dec. 2007, http://www.zdnet.com.tw/print/?id=20126790. [2] "《巴哈姆特》、《遊戲基地》遭受網路攻擊", Apr. 2008, http://mag.udn.com/mag/digital/storypage.jsp?f_ART_ID=123192. [3] "IBM - Proventia Network Intrusion Prevention System (IPS)", May. 2009, http://www-935.ibm.com/services/us/index.wss/offerfamily/iss/a1030570. [4] "Intrusion Prevention System - IPS Software Blade", http://www.checkpoint.com/products/softwareblades/intrusion-prevention-system.html. [5] "Symantec - AntiVirus, Anti-Spyware, Endpoint Security, Backup, Storage Solutions", http://www.symantec.com/index.jsp. [6] "Symantec ManHunt", http://www.symantec.com/region/tw/product/sids/smh/. [7] V. Jacobson, C. Leres, and S. McCanne, "libpcap, Lawrence Berkeley Laboratory, Berkeley, CA", Initial public release June, 1994. [8] M. Roesch, "Snort–lightweight intrusion detection for networks". [9] W. Lee, S.J. Stolfo, and C.U.N.Y.D.O.C. SCIENCE, Data Mining Approaches for Intrusion Detection, COLUMBIA UNIV NEW YORK DEPT OF COMPUTER SCIENCE, 2000. [10] H. Debar, M. Becker, and D. Siboni, "A neural network component for an intrusion detection system", 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992. Proceedings., 1992, pages. 240-250. [11] G. Vigna and R.A. Kemmerer, "NetSTAT: A network-based intrusion detection approach", Computer Security Applications Conference, 1998, Proceedings., 14th Annual, 1998, pages. 25-34. [12] 黃盈源, "一個重用ip堆疊之核心內入侵偵測系統的研究與實作", 長庚大學資訊管理研究所, 2002. [13] D.T. Marr, F. Binns, D.L. Hill, G. Hinton, D.A. Koufaty, J.A. Miller, and M. Upton, "Hyper-Threading Technology Architecture and Microarchitecture", Intel Technology Journal, vol. 6, 2002, pages. 4-15. [14] D. Koufaty and D. Marr, "Hyperthreading technology in the netburst microarchitecture", Micro, IEEE, vol. 23, 2003, pages. 56-65. [15] Intel Corporation, "Introduction to Hyper-Threading Technology", 2001. [16] D. Geer, "Chip makers turn to multicore processors", IEEE Computer, vol. 38, 2005, pages. 11-13. [17] G. Koch, "Discovering Multi-Core: Extending the Benefits of Moore’s Law", Technology, 2005, page. 1. [18] R.M. Ramanathan and T. Evangelist, "Intel Multi-Core Processors: Leading the Next Digital Revolution", Technology, 2005, page. 1. [19] J. Sanders, "Linux, Open Source, and Software's Future", 1998. [20] G. Hertel, S. Niedner, and S. Herrmann, "Motivation of software developers in Open Source projects: an Internet-based survey of contributors to the Linux kernel", Research Policy, vol. 32, 2003, pages. 1159-1177. [21] M.W. Godfrey and Q. Tu, "Evolution in open source software: a case study", Software Maintenance, 2000. Proceedings. International Conference on, 2000, pages. 131-142. [22] A. Hars, "Working for Free? Motivations for Participating in Open-Source Projects", International Journal of Electronic Commerce, vol. 6, 2002, pages. 25-39. [23] A. Foundation, Apache http server project, 1999. [24] P. Albitz, DNS and Bind, O'Reilly & Associates, Inc. Sebastopol, CA, USA, 2001. [25] A. Mockus, R.T. Fielding, and J.D. Herbsleb, "Two case studies of open source software development: Apache and Mozilla", ACM Trans. Softw. Eng. Methodol., vol. 11, 2002, pages. 309-346. [26] T. Howlett, Open source security tools, Prentice Hall, 2004. [27] R. Bolla and R. Bruschi, "An effective forwarding architecture for SMP Linux routers", Telecommunication Networking Workshop on QoS in Multiservice IP Networks, 2008. IT-NEWS 2008. 4th International, 2008, pages. 210-216. [28] R. Bolla and R. Bruschi, "IP Forwarding Performance Analysis In The Presence Of Control Plane Functionalities In A PC-Based Open Router", Distributed Cooperative Laboratories: Networking, Instrumentation, and Measurements, 2006, pages. 143-158. [29] D.P. Bovet and M. Cesati, Understanding the Linux kernel, O'Reilly Beijing; Sebastopol, Calif, 2005. [30] Z. Ning, A.J. Cox, and J.C. Mullikin, SSAHA: a fast search method for large DNA databases, Cold Spring Harbor Laboratory Press, 2001. [31] D. Gusfield, "Algorithms on Stings, Trees, and Sequences: Computer Science and Computational Biology", SIGACT News, vol. 28, 1997, pages. 41-60. [32] E. Eskin and P.A. Pevzner, "Finding composite regulatory patterns in DNA sequences", Bioinformatics, vol. 18, 2002, pages. S354-S363. [33] G.A. Stephen, String searching algorithms, World Scientific, 1994. [34] R.A. Baeza-Yates, "Algorithms for string searching", SIGIR Forum, vol. 23, 1989, pages. 34-58. [35] "An explanation of the Brute force algorithm", http://www-igm.univ-mlv.fr/%7Elecroq/string/node3.html#SECTION0030. [36] P. Weiner, "Linear pattern matching algorithms", Switching and Automata Theory, 1973. SWAT '08. IEEE Conference Record of 14th Annual Symposium on, 1973, pages. 1-11. [37] D.E. Knuth, J. Morris, and V.R. Pratt, "Fast Pattern Matching in Strings", SIAM Journal on Computing, vol. 6, Jun. 1977, pages. 323-350. [38] "An explanation of the Knuth-Morris-Pratt algorithm", http://www-igm.univ-mlv.fr/%7Elecroq/string/node8.html#SECTION0080. [39] R.S. Boyer and J.S. Moore, "A fast string searching algorithm", Commun. ACM, vol. 20, 1977, pages. 762-772. [40] "An explanation of the Boyer-Moore algorithm", http://www-igm.univ-mlv.fr/~lecroq/string/node14.html. [41] A.V. Aho and M.J. Corasick, "Efficient string matching: an aid to bibliographic search", Commun. ACM, vol. 18, 1975, pages. 333-340. [42] C. Coit, S. Staniford, and J. McAlerney, "Towards faster string matching for intrusion detection or exceeding the speed of Snort", DARPA Information Survivability Conference & Exposition II, 2001. DISCEX '01. Proceedings, 2001, pages. 367-373 vol.1. [43] N. Desai, "Increasing performance in high speed NIDS", Capturado em: http://www. linuxsecurity. com/resource_files/intrusion_detec tion/Increasing_Performance_in_High_Speed_NIDS. pdf, 2003. [44] S. Boyd-Wickizer, H. Chen, R. Chen, Y. Mao, F. Kaashoek, R. Morris, A. Pesterev, L. Stein, M. Wu, and Y. Dai, "Corey: an operating system for many cores". [45] M. Schlansker, N. Chitlur, E. Oertli, J. Paul M. Stillwell, L. Rankin, D. Bradford, R.J. Carter, J. Mudigonda, N. Binkert, and N.P. Jouppi, "High-performance ethernet-based communications for future multi-core processors", Reno, Nevada: ACM, 2007, pages. 1-12. [46] J. Aas, "Understanding the Linux 2.6. 8.1 CPU Scheduler", Silicon Graphics Int’l, http://josh. trancesoftware. com/linux/linux_ cpu_scheduler. pdf, 2005. [47] Suresh Siddha, Multi-Core and Linux Kernel, Intel Open Source Technology Center, . [48] D.A. Klein, Advanced programmable interrupt controller, Google Patents, 2000. [49] B.R. Davis and B. Young, Input/output subsystem having an integrated advanced programmable interrupt controller for use in a personal computer, US Patent 5,857,090, 1999. [50] 蘇春豔 and 楊小華, "Linux 內核中斷內幕", IBM developerWorks 中國, May. 2007, http://www.ibm.com/developerworks/cn/linux/l-cn-linuxkernelint/index.html. [51] "IRQBALANCE", http://irqbalance.org/. [52] A. Rubini and J. Corbet, Linux Device Drivers, O'Reilly, 2005. [53] L. Rizzo, "Device Polling support for FreeBSD", Proceedings of the Main European BSD Conference (EuroBSDCon 2001), Brighton, UK, 2001. [54] L. Deri, "Improving passive packet capture: Beyond device polling", Proceedings of SANE, 2004. [55] L. Deri, "nCap: Wire-speed packet capture and transmission", Proceedings of E2EMON, 2005. [56] I. Kim, J. Moon, and H.Y. Yeom, "Timer-based interrupt mitigation for high performance packet processing", In Proc. 5th International Conference on HighPerformance Computing in the Asia-Pacific Region, Gold, 2001, http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.18.9625. [57] "Net:NAPI - The Linux Foundation", http://www.linuxfoundation.org/en/Net:NAPI. [58] 鄭衛斌, 丁會寧, 李慶海, and 李慶海, "Linux 的網絡轉發性能研究", 西安交通大學學報, vol. 38, Apr. 2004, pages. 124-126. [59] L. Degioanni, G. Varenni, F. Risso, and J. Bruno, WinPcap: The Windows Packet Capture Library, Januar, 2007. [60] A. Tirumala, F. Qin, J. Dugan, J. Ferguson, and K. Gibbs, "Iperf-The TCP/UDP bandwidth measurement tool", URL: http://dast. nlanr. net/Projects/Iperf, 2004. [61] L. McVoy and S. Graphics, "lmbench: Portable Tools for Performance Analysis". [62] R. Andresen, "Monitoring Linux with native tools", 30th Annual International Conference of the Computer Measurement Group, Inc. December, 2004, pages. 5-10. [63] M. Muuss, "The story of the PING program", sito ufficiale: http://ftp. arl. army. mil/mike/ping. html, 1983. [64] J. Levon and P. Elie, "Oprofile: A system profiler for linux", Web site: http://oprofile. sourceforge. net, 2005.
|