|
[1] W. Almesberger, “Linux Network Traffic Control ― Implementation Overview”, EPFL ICA, February 4, 2001. [2] Jay Beale, James C. Foster, Jeffrey Posluns, Ryan Russell, and Brian Caswell. Snort 2.0 Intrusion Detection. Syngress, 2003. [3] J. Barlow and W. Thrower, 2000, “TFN2K - An Analysis,” http://packetstormsecurity.org/distributed/TFN2k_Analysis-1.3.txt [4] V. Broucek, and P. Turner, 2003, “Intrusion Detection: Forensic Computing Insights arising from a Case Study on SNORT”, In U. E. Gattiker (Ed.), EICAR2003 Conference. Copenhagen, Denmark. [5] C. Douligeris., A. Mitrokotsa., 2003 “DDoS attacks and defense mechanisms: a classification.” Proc. 3rd IEEE Symposium on Signal Processing and Information Technology, Pages 190-193. [6] D. Dittrich, 1999, “The "Tribe Flood Network" distributed denial of service attack tool,” http://staff.washington.edu/dittrich/misc/tfn.analysis [7] D. Dittrich, 1999, “The DoS Project''s "trinoo" distributed denial of service attack tool,” http://staff.washington.edu/dittrich/misc/trinoo.analysis [8] D. Dittrich, 2000, “The "mstream" distributed denial of service attack tool,” http://packetstormsecurity.org/distributed/Mstream_Analysis.txt [9] K. David ,Y. Yau, C. John, S. Lui, F. Liang, and Y. Yam, 2005, “Defending Against Distributed Denial-of-Service Attacks With Max-Min Fair Server-Centric Router Throttles”, IEEE/ACM Transactions on Networking, vol. 13, Pages 29-42. [10] K. Fall and K. Varadhan. The ns manual. http://www.isi.edu/nsnam/ns/ns-documentation.html. [11] J. Haggerty, Q. Shi, and M. Merabti, 2005, "Early Detection and Prevention of Denial-of-Service Attacks: A Novel Mechanism with Propagated Traced-Back Attack Blocking ", IEEE Journal on Selected Areas in Communications, Vol. 23, No. 10. [12] K. Houle, “Trends in Denial of Service Attack Technology”, CERT report, October 2001,http://www.cert.org/archive/pdf/DoS_trends.pdf [13] J. Ioannidis and S. M. Bellovin, 2002 “Implementing Pushback: Router-Based Defense Against DDoS Attacks. In Proc. of the Network and Distributed System Security Symposium(NDSS)”. http://citeseer.ist.psu.edu/ioannidis02implementing.html [14] A. D. Keromytis, V. Misra, and D. Rubenstein, 2004, “ SOS: an architecture for mitigating DDoS attacks.” Selected Areas in Communications, IEEE Journal Vol. 22, Issue: 1. [15] S. Kumar, 1995. Classification and detection of computer intrusions. PhD thesis, Purdue University, W. http://citeseer.ist.psu.edu/kumar95classification.html [16] J. Lemon, 2002, “Resisting SYN flood DoS attacks with a SYN cache”. In Proceedings oftheBSDCon2002 Conference. http://citeseer.ist.psu.edu/lemon02resisting.html [17] L. Limwiwatkul, A. Rungsawang, 2004, “Distributed denial of service detection using TCP/IP header and traffic measurement analysis,” IEEE Symposium on Communications and Information Technology, vol. 1, Pages 605-610. [18] J. Mirkovic, S. Dietrich, D. Dittrich and P. Reiher, 2000, “Internet Denial of Service: Attack and Defense Mechanisms,” Prentice Hall. [19] R. Mahajan , S. M. Bellovin , S. Floyd , J. Ioannidis , V. Paxson and S. Shenker, 2002, “Controlling high bandwidth aggregates in the network”, ACM SIGCOMM Computer Communication Review, Vol.32,No. 3, pp.62-73. [20] Roesch, Martin, 1999, "Snort - Lightweight Intrusion Detection for Networks", Proc. USENIX Lisa ''99, Seattle: Nov. 7-12. [21] M. Robinson, J. Mirkovic, M. Schnaider, S Michel, and P. Reiher, 2003, “Challenges and principles of DDoS defense.” SIGCOMM 2003. [22] C. Siaterlis , V. Maglaris , 2005,“Detecting incoming and outgoing DDoS attacks at the edge using a single set of network characteristics,” Proc. 10th IEEE Symposium on Computers and Communications, Pages 469-475. [23] S. Savage, D. Wetherall, A. Karlin, and T. Anderson, 2001, "Network Support for IP Traceback," ACM/IEEE Trans. Networking , Vol. 9, No. 3. [24] S. Tanachaiwiwat and K. Hwang, 2003, “Differential packet filtering against DDoS flood attacks.” ACM Conference on Computer and Communications Security (CCS). Washington, DC. [25] Hardaker, W. et al. Justification and Requirements for a National DDoS Defense Technology Evaluation Facility. Network Associates Laboratories Report 02-052, July 26, 2002 [26] S. Wash, 2000, “Aladdin Security Alert - Distributed Denial of Service (DDOS) attacks straining the Internet - Windows Attack Trojansfound” http://www.aladdin.com/news/2000/esafe/eSafeDDOSApplets.asp [27] A. Yaar, A. Perrig, D. Song, 2003, ”Pi: a path identification mechanism to defend against DDoS attacks.” Proc. IEEE Symposium on Security and Privacy, Pages 93-107. [28] S. Zhang and P. Dasgupta, 2003, “Denying denial-of service attacks: a router based solution.” International Conference on Internet Computing.
|