References
- Landwehr & Goldschlag, 'Security Issues in Networks with Internet Access,' Proc. IEEE, Vol.85, No. 12, December, 1997 https://doi.org/10.1109/5.650183
- Dorothy E. DENNING, 'Intrusion Detection Model,' IEEE Transactions on Software Engineering, Vol.SE-13, pp.222-232, February, 1987 https://doi.org/10.1109/TSE.1987.232894
- 윤재우, 이승형, 'IP 기반 VPN 프로토콜의 연구동향 : 확장성과 보안성', 한국정보보호학회, 정보보호학회지, 제11권 제6호, pp. 53-43, 2001
- Internet URL, http://rr.sans.org/encryption/mpls2.php
- Frame Relay Forum, 'The Path to MPLS,' WAVESMITH NETWORK, white paper, 2001
- Paul Knight, Bryan Gleeson, 'Network based IP VPN Architecture using Virtual Routers,' IETF Internet Draft Provider Provisioned VPN WG, July, 2002
- Ananth Nagarajan, 'Generic Requirements for Provider Provisioned VPN,' IETF Internet Draft Provider Provisioned VPN WG, December, 2002
- ITU-T, Recommendation Y.1311,'Network Based VPNs-Generic Architecture and Service Requirements,' ITU-T, 2002
- Michael Behringer, 'Analysis of the Security of the MPLS Architecture,' IETF Internet Draft Provider Provisioned VPN WG, October, 2002
- R. Callon, M. Suzuki, 'A Framework for Layer 3 Provider Provisioned Virtual Private Networks,' IETF Internet Draft Provider Provisioned VPN WG, October, 2002
- Internet URL, http:www.acm.org/xrds2-4/intrus.html
- Internet URL, http://staff/ashington.edu /gray/papers/credo.html
- ITU-T Recommendation Y.1311-1, 'Network Based IP VPN over MPLS architecture,' ITU-T, 2001
- Internet URL, http://www.cosinecom.com
- Robert N. Smith, Sourav Bhattacharya, 'Firewall Placement In A Large Network Topology,' IEEE FTDCS '97, p.40, October, 1997 https://doi.org/10.1109/FTDCS.1997.644701
- Herve Debar, Marc Dacier, 'Toward a Taxonomy of Intrusion-Detection Sysetms,' IBM R&D, 1998
- Jeremy de Clercq, Cliff Wang, 'An Architecture for Provider Provisioned CE-based Virtual Private Networks using IPsec,' IETF Internet Draft Provider Provisioned VPN WG, June, 2002
- Eric C. Rosen, 'Use of PE-PE IPsec in RFC2547 VPNs,' IETF Internet Draft Provider Provisioned VPN WG, August, 2002
- M. Carugi, 'Service requirements for Layer 3 Provider Provisioned Virtual Private Networks : ,' IETF Internet Draft Provider Provisioned VPN WG, October, 2002
- Samuel Patton, David Doss, William Yurcik, 'Distributed weakness in virtual private networks,' IEEE LCN '00, p.96, 2000 https://doi.org/10.1109/LCN.2000.891014
- Ananth Nagarajan, 'Generic Requirements for Provider Provisioned VPN,' IETF Internet Draft Provider Provisioned VPN WG, December 2002