|
[1] L. Garber, "Denial-of-Service Attacks Rip the Internet," IEEE Computer, vol. 33, no. 4, pp. 12 - 17, 2000. [2] "DDoS attacks in the first half of 2014," Arbor Network, [Online]. Available: http://www.arbornetworks.com/corporate/blog/5243-volumetric-with-a-capital-v. [3] "Denial-of-service attack," Wikipedia, [Online]. Available: http://en.wikipedia.org/wiki/Denial-of-service_attack. [4] "IP Denial-of-Service Attacks," CERT, 12 1997. [Online]. Available: https://www.cert.org/historical/advisories/CA-1997-28.cfm?. [5] "Windows 7, Vista exposed to 'teardrop attack'," 9 2009. [Online]. Available: http://www.zdnet.com/blog/security/windows-7-vista-exposed-to-teardrop-attack/4222. [6] "LAND Attack," Wikipedia, [Online]. Available: http://en.wikipedia.org/wiki/LAND. [7] "DNS Amplification Attacks," US-CERT, 2013. [Online]. Available: https://www.us-cert.gov/ncas/alerts/TA13-088A. [8] "Distributed Denial of Service attacks with DNS amplification against Spamhaus," Cert-IST, 2013. [Online]. Available: http://www.cert-ist.com/public/en/SO_detail?code=201304_spamhaus. [9] S. M. Bellovin, "Security Problems in the TCP/IP Protocol Suite," ACM SIGCOMM Computer Communication, vol. 19, no. 2, pp. 32-48 , 1989. [10] "IP Spoofing Attacks and Hijacked Terminal Connections," CERT Advisory CA-96.01, 1995. [Online]. Available: https://www.cert.org/historical/advisories/CA-1995-01.cfm. [11] K. Wakasa, K. Takemori, T. Kai and H. Hazeyama, "Demonstration Experiments Towards Practical IP Traceback on the Internet," Consumer Communications and Networking Conference, pp. 1-5, 2010. [12] O. Demir and B. Khan, "Quantifying Distributed System Stability through Simulation: A Case Study of an Agent-Based System for Flow Reconstruction of DDoS Attacks," International Conference on Intelligent Systems, Modelling and Simulation, pp. 312 - 317, 2010. [13] S. Yu, W. Zhou, R. Doss and W. Jia, "Traceback of DDoS Attacks Using Entropy Variations," IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 3, pp. 412 - 425, 2011. [14] Y. Xiang, K. Li and W. Zhou, "Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics," IEEE Transactions on Information Forensics and Security, vol. 6, no. 2, pp. 426 - 437, 2011. [15] J. François, I. Aib and R. Boutaba, "FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks," IEEE/ACM Transactions on Networking, vol. 20, no. 6, pp. 1828 - 1841, 2012. [16] S. Savage, D. Wetherall, A. Karlin and T. Anderson, "Practical Network Support for IP Traceback," SIGCOMM Comput. Commun. Rev., vol. 30, no. 4, pp. 295-306, 2000. [17] A. Belenky and N. Ansari, "IP Traceback With Deterministic Packet Marking," IEEE Communications Letters, vol. 7, no. 4, pp. 162 - 164, 2003. [18] M. Okada, A. Kanaoka, Y. Katsuno and E. Okamoto, "32-bit as Number Based IP Traceback," Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 628 - 633, 2011. [19] A. R. Kiremire, M. R. Brust and V. V. Phoha, "A Prediction Based Approach to IP Traceback," IEEE 37th Conference on Local Computer Networks Workshops, pp. 1022 - 1029, 2012. [20] M. D. D. Moreira, R. P. Laufer, N. C. Fernandes and O. C. M. B. Duarte, "A Stateless Traceback Technique for Identifying the Origin of Attacks from a Single Packet," IEEE International Conference on Communications, pp. 1 - 6, 2011. [21] S. Saurabh and A. S. Sairam, "Linear and Remainder Packet Marking for fast IP traceback," Fourth International Conference on Communication Systems and Networks, pp. 1 - 8, 2012. [22] S. Saurabh and A. S. Sairam, "A More Accurate Completion Condition for Attack-Graph Reconstruction in Probabilistic Packet Marking Algorithm," National Conference on Communications, pp. 1 - 5, 2013. [23] V. A. Foroushani and A. N. Zincir-Heywood, "Deterministic and Authenticated Flow Marking for IP Traceback," IEEE 27th International Conference on Advanced Information Networking and Applications, pp. 397 - 404, 2013. [24] L. A. Sanchez, W. C. Milliken, A. C. Snoeren, F. Tchakountio, Christine, E. Jones, S. T. Kent, C. Partridge and W. T. Strayer, "Hardware Support for a Hash-Based IP Traceback," Proceedings on DISCEX '01, vol. 2, pp. 146 - 152, 2001. [25] A. C. Snoeren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, S. T. Kent and W. T. Strayer, "Hash-Based IP Traceback," Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications (SIGCOMM '01), vol. 31, no. 4, pp. 3-14, 2001. [26] A. C. Snoeren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, B. Schwartz, S. T. Kent and W. T. Strayer, "Single-Packet IP Traceback," IEEE/ACM Transactions on Networking, vol. 10, no. 6, pp. 721 - 734, 2002. [27] A. Castelucio, A. Ziviani and R. M. Salles, "An AS-level overlay network for IP traceback," IEEE Network, pp. 36 - 41, 2009. [28] W. C. Kuo, Y. L. Chen, S. C. Tsai and J. S. Li, "Single-Packet IP Traceback with Less Logging," Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 97 - 100, 2011. [29] M.Vijayalakshmi, S. Shalinie and A. Pragash, "IP traceback system for network and application layer attacks," International Conference on Recent Trends In Information Technology, pp. 439 - 444, 2012. [30] M. H. Yang and M. C. Yang, "RIHT: A Novel Hybrid IP Traceback Scheme," IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 789 - 797, 2012. [31] J. S. Bong, Y. W. Choi and S. Kim, "An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks," Proceedings of the 5th international conference on Information Security Applications (WISA'04), pp. 204-210 , 2004. [32] C. H. Wang, C. W. Yu, C. K. Liang, K. M. Yu, W. Ouyang, C. H. Hsu and Y. G. Chen, "Tracers Placement for IP Traceback against DDoS Attacks," international conference on Wireless communications and mobile computing (IWCMC '06), pp. 355-360 , 2006. [33] C. H. Wang and Y. C. Chiang, "Multi-Layer Traceback under the Hierarchical," 22nd International Conference on Advanced Information Networking and Applications - Workshops, pp. 590 - 595, 2008. [34] M. H. Islam, K. Nadeem and S. A. Khan, "Optimal Placement of Detection Nodes against Distributed Denial of Service Attack," International Conference on Advanced Computer Control, pp. 675 - 679, 2009. [35] E. Kline, A. Afanasyev and P. Reiher, "Shield: DoS filtering using traffic deflecting," 19th IEEE International Conference on Network Protocols, pp. 37 - 42, 2011. [36] H. S. Kang and S. R. Kim, "Small DDoS defense system using routing deployment method," World Congress on Internet Security, pp. 204 - 206, 2012. [37] O. Demir, B. Khan, G. B. Brahim and A. Al-Fuqaha, "Optimizing agent placement for flow reconstruction of DDoS attacks," 9th International on Wireless Communications and Mobile Computing Conference, pp. 83 - 89, 2013. [38] "BRITE," [Online]. Available: http://www.cs.bu.edu/brite/. [39] "SKITTER," [Online]. Available: http://www.caida.org/tools/measurement/skitter/. [40] "SQLite," [Online]. Available: http://www.sqlite.org/.
|