[1] Huang Shiang-Ming,Wu Quincy,Lin Yi-Bing.Enhancing Teredo IPv6 tunneling to traverse the symmetric NAT[J].Communication Letters,2006,10(5):408-410.[2] 吴贤国,刘敏,李忠诚.面向NAT用户的IPv6 隧道技术研究[J].计算机学报,2007,30(1):1-9. Wu Xian-Guo,Liu Min,Li Zhong-Cheng.Research on the IPv6 tunneling technology designed for network address translator users[J].Chinese Journal of Computers,2007,30(1):1-9.(in Chinese)[3] Thaler Dave.RFC6081(Teredo extensions)[S].IETF RFC,2011.[4] Malone David.Observations of IPv6 addresses[A].Proceedings of the 9th Passive and Active Measurement Conference (PAM)[C].Berlin:Springer-Verlag,2008.21-30.[5] Defeche Martin,Vyncke Eric.Measuring IPv6 traffic in BitTorrent networks[OL].http://tools.ietf.org/html/draft-defeche-ipv6-traffic-in-p2p-networks-00,2012.[6] Zander Sebastian,Andrew LH Lachlan,Armitage Grenville.Investigating the IPv6 Teredo tunneling capability and performance of internet clients [J].ACM SIGCOMM Computer Communication Review,2012,42(5):13-20.[7] Hoagland James.The Teredo protocol:tunneling past network security and other security implications[R].Cupertino:Symantec,2007.[8] Hogg Scott,Vyncke Eric.IPv6 security[M].Indianapolis:Pearson Education,Cisco Press,2008.[9] Frankel Shelia,Graveman Richard,Pearce John,Rooks Mark.Guidelines for the secure deployment of IPv6[R].Gaithersburg:National Institute of Standards and Technology,2010.80-119.[10] [JP3]Thaler Dave,Krishnan Suresh,Hoagland James.RFC5991(Teredo security updates)[S].IETF RFC,2010.[11] P Shanmugaraja,D Balamurugan,S Chandrasekar.An approach to secure Teredo tunneling technology[J].International Journal of Engineering Research & Technology (IJERT),2013,2(3):1-6.[12] F Gont,W Liu.Security implications of IPv6 on IPv4 networks[OL].http://tools.ietf.org/html/draft-ietf-opsec-ipv6-implications-on-ipv4-nets-05,2013. |