|
[1]Web Claw, http://www.rohitab.com/discuss/index.php?showtopic=4708, 2008. [2]J. Mirkovic and P. Reiher, “A Taxonomy of DDoS Attack and DDoS Defence Mechanisms,” ACM SIGCOMM Computer Communication Review, pp. 39-53, Apr. 2004. [3]R. K. C. Chang, “Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial,” IEEE Communication Magazine, pp. 42-51, Oct. 2002. [4]A. Belenky and N. Ansari, “On IP Traceback,” IEEE Communication Magazine, pp. 142-153, July 2003. [5]Z. Gao and N. Ansari, “Traceing Cyber Attacks from the Practical Perspective,” IEEE Communications Magazine, pp. 123-131, May 2005. [6]A. Hussain, J. Heidemann, and C. Papadopolous, “A Framework for Classifying Denial of Service Attacks,” ACM SIGCOMM, pp. 99-110, Aug. 2003. [7]W32/Blaster, http://www.multipro.com/mblaster.htm, 2008. [8]T. Dubendorfer, M. Bossardt, and B. Plattner, “Adaptive Distributed Traffic Control Service for DDoS Attack Mitigation,” 19th IEEE Intermational Parallel and Distributed Processing Symposium, pp. 1-8, Apr. 2005. [9]Mirkovic and J. Reiher, “D-WARD: a Source-end Defense against Flooding Denial-of-Service Attacks,” IEEE Transactions on Dependable and Secure Computing, vol. 2, no. 3, pp. 216-232, Sept. 2005. [10]R. Mahajan, S. M. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker, “Controlling High Bandwidth Aggregate in the Network,” ACM SIGCOMM Computer Communication Review, vol. 32, pp. 62-73, July 2002. [11]A. D. Keromytis, V. Misra, and D. Rubenstein, “SOS: Secure Overlay Services,” ACM SIGCOMM, pp. 61-72, Aug. 2002. [12]陳俊傑,楊宏昌,林宏達,游秉賢,曾黎明,「以重疊網路防禦分散式阻斷服務攻擊」,台灣網際網路研討會,2005。 [13]D. L. Cook, W. G. Morein, A. D. Keromytis, V. Misra, and D. Rubenstein,“WebSOS: Protecting Web Servers from DDoS Attacks,” 11th IEEE International Conference On Networks(ICON), pp. 461-466, Aug. 2003. [14]A. D. Keromytis, V. Misra, and D. Rubenstein, “SOS: An Architecture for Mitigating DDoS Attacks,” IEEE Journal on Selected Areas Communications, vol. 22, no. 1, Jan. 2004. [15]Ju Wang, L. Lu, and A. A. Chien, “Tolerating Denial-of-Service Attacks Using Overlay Networks – Impact of Topology,” ACM SSRS, pp. 43-52, Oct. 2003. [16]A. Stavrou, A. D. Keromytis, J. Nieh, V. Misra, and D. Rubenstein, “MOVE: An End-to-End Solution To Network Denial of Service,” Internet Society NDSS’05, pp. 5-21, Feb. 2005. [17]J. Ioannidis and S. M. Bellovin, “Implementating PUSHBACK: Router-Based Defence against DDoS Attack,” Network and Distributed System Security Symposium, pp. 6-14, Feb. 2002. [18]R. Mahajanm, S. Bellvin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker. “Controlling High Bandwidth Aggregates,” Netwrok Computer Communications Review, pp. 32-33, July 2002. [19]K. Park and H. Lee, “On the Effectiveness of Router-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets,” ACM SIGCOMM 2001, pp. 15-26, Oct. 2001. [20]J. Ioannidis and S. M. Bellovin, “PUSHBACK:Router-Based Defence Against DDoS Attacks,”NDSS 2002, pp. 6-22, Feb. 2002. [21]DDoS, http://www.study-area.org/tips/syn_flood.htm, 2008. [22]S. Ranjan, R. Swaminathan, M. Uysal, and E. W. Knightly, ”DDoS-Resilient Scheduling to Counter Application Layer Attacks under Imperfect Detection,” IEEE INFOCOM, pp. 1-13, Apr. 2006. [23]T. Anderson, T. Roscoe, and D. Wetherall, “Preventing Internet Denial-of-Service with Capabilities,” HotNet II 2003, pp. 1-6, Nov. 2003.
|