8.
http://xgu.ru/wiki/DHCP_snooping[Электронный ресурс].
9.
Michael H. Behringer
,
Monique J.
Morrow. MPLS VPN Security. Cisco Press, 2005.
P. 312.
10.
ITU-T Recommendation X.509.
Information technology — Open Systems
Interconnection. The Directory: Authentication framework (1993 edition — version 2,
1997 edition version 3).
11.
ETSI ETS 300 841.
Telecommunications Security; Integrated Services digital
Network (ISDN); Encryption Key management system for audio-visual services,
1998.
12.
Бельфер Р.А.
Сети и системы связи (технологии, безопасность) [Электронное
учебное издание]. М.: МГТУ им. Н.Э. Баумана, 2012. 738 с.
REFERENCES
[1] Gol’dshteyn F.B., Gol’dshteyn B.S. Tekhnologiya i protokoly MPLS [Technology
and MPLS protocols]. SPb., BKhV-Peterburg Publ., 2005. 304 p.
[2] Alwayn V. Advanced MPLS design and implementation (CCIE professional
development). Cisco Press, 2001. 496 p. (Russ. ed.: Oliveyn V. Struktura i realizatsiya
sovremennoy tekhnologii MPLS [Design and implementation of modern technology
MPLS]. Moscow, Vil’yams Publ., 2004. 480 p.).
[3] Bel’fer R.A., Petrukhin I.S. Analysis of sources of information security threats to
MPLS-based VPRNs.
Vestn. Mosk. Gos. Tekh. Univ. im. N.E. Baumana, Priborostr.
[Herald of the Bauman Moscow State Tech. Univ., Instrum. Eng.], 2013, no. 4,
pp. 79–89 (in Russ.).
[4] Bel’fer R.A. VPN MPLS security threats in the area between neighboring routers
and IPSec protection.
Elektrosvyaz’
[Telecommunications and Radio Engineering],
2013, no. 4, pp. 25–27 (in Russ.).
[5] Tanenbaum A., Wetherall D. Computer Networks. Prentice Hall, 5 Ed., 2010. 960 p.
(Russ. ed.: Tanenbaum E., Uezeroll D. Komp’yuternye seti. SPb., Piter Publ., 2012.
954 p.).
[6] IEEE 802.1d. Media Access Control Bridges. IEEE, 2011.
[7] IEEE 802.1q. Media Access Control Bridges and Virtual Bridged Local Area
Networks. IEEE, 2013.
[8] Samoylenko N.
DHCP snooping.
WIKI-site on UNIX / LINUX-
systems and systems with open source software (in Russ.). Available at:
http://xgu.ru/wiki/DHCP_snooping(accessed 01.11.2014).
[9] Behringer Michael H., Morrow Monique J. MPLS VPN Security. Cisco Press, 2005.
312 p.
[10] ITU-T Recommendation X.509. Information technology — Open Systems
Interconnection. The Directory: Authentication framework. ITU, 1993 ed., ver. 2.
ITU, 1997 ed., ver. 3.
[11] ETSI ETS 300 841. Telecommunications Security; Integrated Services
digital Network (ISDN); Encryption Key management system for audio-
visual services. ETSI, 1998. 30 p. Available at:
http://www.etsi.org/de-liver/etsi_i_ets/300800_300899/300841/01_30_9742/ets_300841e01v.pdf (accessed
01.11.2014).
[12] Bel’fer R.A. Seti i sistemy svyazi (tekhnologii, bezopasnost’). Elektronnoe uchebnoe
izdanie na CD-ROOM [Network and communication system (technology, security).
Electronic educational edition at CD-ROM]. Moscow, MGTU im. N.E. Baumana
Publ., 2012. 738 p.
Статья поступила в редакцию 18.06.2014
56 ISSN 0236-3933. Вестник МГТУ им. Н.Э. Баумана. Сер. “Приборостроение”. 2015. № 1