13.Stevens95Wright G R,Stevens W R.TCP/IP Illustrated Volume2: The Implementation.Addison-Wesley,Reading,Mass,1995
2Dharmapurikar S, Paxson V. Robust TCP Stream Reassembly in the Presence of Adversaries[C]//Proc. of the 14th Conference on USENIX Security Symposium. Baltimore, USA: ACM Press, 2005.
3Thompson K, Miller G, Wilder R. Wide-area Internet Traffic Patterns and Characteristics[J]. IEEE Communications Society, 1997, 11(6): 10-23.
4Song Haoyu, Dharmapurikar S, Turner J, et al. Fast Hash Table Lookup Using Extended Bloom Filter: An Aid to Network Processing[J]. ACM SIGCOMM Computer Com- munication Review, 2005, 35(4): 181-192.
5Li Xin, Ji Zhengzhou, Hu Mingzeng. Stateful Inspection Firewall Session Table Processing[J]. International Journal of Information Technology, 2005, 11(2): 21-30.
6Roesch M. Snort-lightweight Intrusion Detection for Net- works[C]//Proc. of the 13th USENIX Conference on System Administration. Seattle, USA: ACM Press, 1999.
7Paxson V. Bro: A System for Detecting Network Intruders in Real Time[J]. Computer Networks, 1999, 31(23): 2435-2463.
8Oh J, Kim B, Yoon S, et al. Architecture and Mechanisms for Implementing an FPGA-based Stateful Intrusion Detection System[J]. International Journal of Computer Science and Network Security, 2007, 7(5): 110-117.
9Yoon S, Kim B, Oh J, et al. High Performance Session State Management Scheme for Stateful Packet Inspection[C]//Proc. of the 10th Asia-Pacific Conference on Network Operations and Management Symposium: Managing Next Generation Networks and Services. Berlin, Germany: Springer-Verlag, 2007.
10Kim H, Kim J H, Kang I, et al. Preventing Session Table Explosion in Packet Inspection Computers[J]. IEEE Transactions on Computers, 2005, 54(2): 238-240.