에이전트 기반 액티브 네트워킹 기술

  • 전용희 (대구카톨릭대학교 컴퓨터정보통신공학부) ;
  • 장정숙 (대구카톨릭대학교 대학원) ;
  • 장종수 (한국전자통신연구원 네트워크보안연구부) ;
  • 손승원 (한국전자통신연구원 네트워크보안연구부)
  • Published : 2003.08.01

Abstract

Keywords

References

  1. http://www.darpa.mil/ito/research
  2. Tennenhouse. D., et al., 'A Surveyof Active Network Research', IEEE Communications Magazine, January1997
  3. http://www.sds.lcs.mit.edu/activeware, http://www.netlab.cs.ntm.ernetin/cs481/ current/cs97187/an.html
  4. Ulana Legedza, David Wetheralland John Guttag, 'Improving the performance of distributed applicationsusing active networks', IEEEINF0C0M'98, 1998.
  5. Calvert. K. et al, Architectural Framework for Active Networks Active Networks Working Group Draft, July 1999.
  6. Alexander D.S., Braden B.. Gunter C.A., Jackson W.A., Keromytis A.'D.Milden G.A.. and Wetherall D.A. Active Network Encapsulation Protocol Working Group Draft, July 1997(A치 교P). Active Networks
  7. David Wetherall, Ulana Legedza and John Guttag, "Introducing New Internet Services: Why and How", IEEE Network Magazine, July/August 1998
  8. http://www.darpa.mil/ato/Programs/active-networks/actnet.htm
  9. D. J. Wetherall, J. V. Guttag, and D. L.Tennenhouse, 'ANTS: Architecture for Building and Dynamically Deploying Network Protocols', Proc IEEE OPENARCH 98, April 1998.
  10. K. Calvert, E. Zegura, and J.Sterbenz. "CANEs: A Modest Approach to Active Networking", InProceeding of IEEE Computer Communications Workshop, September 1997.
  11. Dan Decasper and Bernhard Plattner. 'DAN: Distributed Code Cashing for active Networks', Proc IEEE INFOCOM 98, San Francisco CA, March/April 1998.
  12. D. J. Wetherall and D. L. Tennen-house, 'The Active IP Option', InProceeding of 7th ACM SIG0PS European Workshop, September1996
  13. D.S. Alexander, et al. Active Protocol Network Encapsulation (ANEP). In RFC Draft, July 1997.
  14. B. Schwartz, et al., 'Smart Packets for Active Networks'. In Proceeding of IEEE Communication Surveys, First Quarter 1999.
  15. Alexander, D.8., Arbaugh, W.A.,Hicks, M.A., Kakkar P., Keromytis A., Moore J.T., Nettles S.M., andSmith J.M., "The Switch Ware Active Network Architecture", IEEE Network-Special Issue on Active and Controllable Networks, vol. 12 no. 3, 1998.
  16. Da Silva, S., Florissi, D. and Yemini, Y., Net Script: A Lang Uage-Based Approach to Active Networks,Technical Report, Computer Science Dept, Columbia University, January27, 1998.
  17. M. Wooldrige and N. Jennings. Intelligent Agents : Theory and Practice. 1995.
  18. Konstantinos Psounis, Networks: Applications, Security, Safety, and Architectures, in IEEE communications Quarter 1999.
  19. Jonathan Dale, 'A Mobile Agent Architecture for distributed Information Management', 1997.
  20. Chih-Lin hu, Wen-Shyen E. Chen,'A Mobile Agent-Based Active Network Architecture', Department of Electrical Engineering National Taiwan University, IEEE 0-7695-0568-6/00, 2000
  21. Stamatis Karnouskos, 'Agent Populated Active Networks', 2nd International Conference on Advanced Communication Technology (ICACT 2000), February 16-18, 2000,
  22. Stamatis Karnouskos. 'Dealingwith Denial-of-Service Attacks inAgentenabled Active and Programmable Infrastructures', 25th IEEE International Computer Softwareand Applications Conference (COM-PSAC 2001), October 8-12, 2001, Chicago, Illinois. U.S.A (ISBN0-7695-1372-7)
  23. http://www.tri.ibm.co.jp/aglets
  24. http://www.meitca.com/HSL/Projects/Concordia
  25. http://www.gent.org/pub/satp/palers/maf5.html
  26. http://www.ikv.de/prducts/grasshopper
  27. http://www.genmaigc.com/technology/odyssey.html
  28. http://www.objectspace.com/voyager
  29. Menelaos K. Perdikeas, Fotis G.Chatzipapadopoulos, 'An Evaluation Study of Mobile Agent Technology:Standardization, Implementation and Evolution,' IEEE, 0-7695-0253- 9/99.pp.287-291, 1999.
  30. http://choices.cs.uiuc.edu/Security/seraphim/
  31. http://choices.cs.uiuc.edu/Security/cherubim/
  32. http://www.ist-fain.org/
  33. http://www.etri.re.kr
  34. Yang Kun. Guo Xin, Liu Dayou, Security in Mobile System Problem sand Approaches, Department of Computer Science, JiLin University, Changchun, 130023, National Natural Science Fund and 863 high-tech Project, pp21-28
  35. Stamatis Karnouskos, 'SecurityImplications of Implementing ActiveNetwork Infrastructures using AgentTechnology', Computer Networks 36(2001) 87-100. https://doi.org/10.1016/S1389-1286(01)00155-4