ZAGAR D,GRGIC K,RIMAC-DRLJE S.Security aspects in IPv6 networks[J].Computers and Electrical Engineering,2007(33):425-437.
[2]
CAICEDO C E,JOSHI J B D,TULADHAR S R.IPv6 security challenges[J].Computer,2009,42(2):36-42.
[3]
张玉健,张月琳.基于PKI的IPv6安全邻居发现协议[J].计算机工程,2008,34(8):187-189.ZHANG Yu-jian,ZHANG Yue-lin.IPv6 neighbor discovery protocol based on PKI[J].Computer Engineering,2008,34(8):187-189.(in Chinese)
[4]
周增国,李忠明.Linux平台下Netfilter/IPtables包过滤防火墙的研究与应用[J].网络安全技术与应用,2008(1):49-50.ZHOU Zeng-guo,LI Zhong-ming.Study and application of Netfilter/IPtables packet filter firework based on Linux[J].Network Security Technique and Application,2008(1):49-50.(in Chinese)
[5]
JONES A.Netfilter and IPtables:astructural examination[EB/OL].[2004-02-26].http:∥www.sans.org/reading room/whitepapers/firewalls/netfilter-iptables-structural-examination-1392.
[6]
CYNTHIA M,JEFFREY D.Internet Protocol version 6(IPv6)protocol security assessment[C]∥Proceedings of 2007Military Communications Conference.Orlando:Institute of Electrical and Electronics Engineers,2007,29:1-7.
[7]
HONGSEOK J,JUNGHOON J.IPv6 neighbor discovery protocol for common prefix allocation in IEEE 802.16[C]∥Proceedings of the 8th International Conference on Advanced Communication Technology.Phoenix Park:Institute of Electricaland Electronics Engineers,2006(3):1661-1663.
[8]
SABIR M R,FAHIEM M A,MIAN M S.An overview of IPv4 to IPv6 transition and security issues[C]∥Proceedings of 2009WRI International Conference on Communications and Mobile Computing.Kunming:Institute of Electrical and ElectronicsEngineers,2009(3):636-639.
[9]
JUNG B H,LIM J D,KIM Y H,et al.An analysis of security threats and network attacks in IPv6[J].Electronics andTelecommunications Trends,2007,22(1):37-50.