|
[1]趨勢科技,2016年十大重大資安事件,[cited 2017 March];Available from: https://blog.trendmicro.com.tw/?p=45442 [2]K. Greene,“Software defined networking,” Technology review-the 10 emerging technologies of 2009, Mar. 2009. [3]W. Stallings, “Software-Defined Networks and OpenFlow,” The Internet Protocol Journal, vol. 16, no. 1, pp. 2-14, Mar. 2013. [4]N. Mckeown, T. Anderson, H. Balakrishnan, G. Parulkar, L.Peterson, J. Rexford, S. Shenker, and J. Turner, “Openflow:Enabling Innovation in Campus Networks,”ACM SIGCOMM Computer Communication Review,vol.38,issue 2, pp.69-74, Apr. 2008. [5]Network Access Control (NAC), [cited 2017 March]; Available from: http://searchnetworking.techtarget.com/definition/network-access-control [6]I-Cheng Hunag “Implementation of Network Access Control for International Companies: A Case Study of A High-tech Company,”Master’s thesis, National Chung Cheng University, Jul. 2015. [7]802.1X: Port-Based Authentication Standard for Network Access Control (NAC), Juniper Networks.[cited 2017 March] ; Available from: http://www.juniper.net/us/en/products-services/what-is/802-1x-nac/ [8]DMZ, Demilitarized Zone, [cited 2017 March] ; Available from:https://zh.wikipedia.org/wiki/DMZ [9]Y. Yamasaki, Y. Miyamoto, J. Yamato, H. Goto, and H. Sone, “Flexible Access Management System for Campus VLAN Based on OpenFlow,”2011 IEEE/IPSJ 11th International Symposium on Applications and the Internet (SAINT),pp. 347-351,Jul. 2011. [10]Javid, Tariq, Tehseen Riaz, and Asad Rasheed,“A layer 2 firewall for software defined network,” 2014 Conference on In Information Assurance and Cyber Security (CIACS),pp. 39-42,Jun. 2014. [11]Karamjeet Kau, Krishan Kumar, Japinder Singh, Navtej Singh Ghumman, “Programmable firewall using Software Defined Networking,” 2015 2nd International Conference on Computing for Sustainable Global Development(INDIACom),pp.2125-2129,Mar. 2015. [12]Cho, H., Kang, S., & Lee, Y. “Centralized ARP proxy server over SDN controller to cut down ARP broadcast in large-scale data center networks,”2015 International Conference on Information Networking (ICOIN),pp.301-306,Jan. 2015. [13]Mowla, N. I., Doh, I., & Chae, K. “An efficient defense mechanism for spoofed IP attack in SDN based CDNi,”2015 International Conference on Information Networking (ICOIN),pp.92-97,Jan. 2015. [14]Open Networking Foundation,Software-Defined Networking: The New Norm for Networks. ONF White Paper,Apr. 2012. [cited 2017 March] ; Available from: https://www.opennetworking.org/images/stories/downloads/sdn-resources/white-papers/wp-sdn-newnorm.pdf [15]Ryu SDN Framwork, [cited 2017 March] ; Available from:http://osrg.github.io/ryu [16]Ryu,OpenFlow v1.5 Messages and Structures Controller-to-Switch Messages. [cited 2017 March] ; Available from: http://ryu.readthedocs.io/en/latest/ofproto_v1_5_ref.html [17]Open vSwitch, [cited 2017 March] ; Available from: http://openvswitch.org [18]Open Networking Foundation,OpenFlow Switch Specification Version 1.5.1 ( Protocol version 0x06), Mar. 2015. [cited 2017 March] ; Available from: https://www.opennetworking.org/images/stories/downloads/sdn-resources/onf-specifications/openflow/openflow-switch-v1.5.1.pdf [19]Oracle Virtual Box, [cited 2017 March] ; Available from:https://www.virtualbox.org [20]Mininet, [cited 2017 March] ; Available from: http://mininet.org [21]ITU-T Y.1540, [cited 2017 April] ; Available from: http://www.itu.int/rec/T-REC-Y.1540-201607-I
|