3RFC2893.Transition Mechanisms for IPv6 Hosts and Routers[S].
4LU Han-yu,LIAN Hong,WANG He-chuang,WANG Hua-jun,WANG Xuben.DDoS attack source tracing technology research Based on IPv6.IEEE International Conference on Internet Technology and Applications (ITAP 2010),2010,Wuhan,China.
1[1]S Deering,R Hinden. Internet Protocol, Version 6 (IPv6)[EB/OL]. http://www.ietf.org/rfc/rfc2402.txt.1998-11-02.
2[2]Matthew G Naugle. Network Protocol[M]. NewYork:McGraw-Hill,1998:477-518.
3[3]S Kent,R Atkinson. Architecture for the Internet Protocol[EB/OL]. http://www.ietf.org/rfc/rfc2402.txt/1998-11-2.
4[4]John e Canavan. Fundamentals of Network Security[M]. Boston:Artech House,2001:21-72.
5[5]D Harkins ,D Carrel. The Internet Key Exchange(IKE)[EB/OL]. http://www.ietf.org/rfc/rfc2402.txt/1998-11-02.
6[6]S Kent,R Atkinson. IP Authentication Header[EB/OL]. http://www.ietf.org/rfc/rfc2402.txt/1998-11-02.
7[7]S Kent,R Atkinson. IP Encapsulating Security Payload (ESP) [EB/OL]. http://www.ietf.org/rfc/rfc2402.txt/1998-11-02.
8[8]Maughan D,Schertler M.Schneider M, et al.Internet Security Association and Key Management Protocol(ISAKMP)[EB/OL]. http://www.ietf.org/rfc/rfc2402.txt/1998-11-02.
9John Stenbit. Internet Protocol version 6 [ D]. Department of Defense, 2003.
10Chloe Albanesius. National Journal' s Technology Daily[ J/OL]. http ://nationaljournal. com/about/technologydaily.