|
[1]H.Burch,B.Cheswick,“Tracing Anonymous Packets to Their Approximate Source”,Usenix LISA, Dec, 2000, pp.319-327 [2]D.X.Song,A.Perrig,“Advanced and Authenticated Marking Schemes for IP Traceback”,In:Proc: IEEE INFOCOM ,Apr ,2001,pp.878-886 [3]A.Yaar,A.Perrig,D.Song,“Pi: A Path Identification Mechanism to Defend against DDoS Attacks”, In:Proc. IEEE Symposium on Security and Privacy,May ,2003,pp.93-107 [4]S.Savage,D.Wetherall,A.Karlin,T.Anderson, Practical Network Support for IP Traceback, In Proc.ACM SIGCOMM Conference ,August,2000,pp.295-306 [5]S.Savage,D.Wetherall,A.Karlin,T.Anderson, Network support for IP traceback, ACM/IEEE Transactions on Networking, vol.9, no:3,June, 2001, pp.226-237. [6]A.Belenky and N.Ansari, IP Traceback with Deterministic Packet Marking, IEEE Comm.Letters, vol.7, no.4, Apr, 2003, pp.162-164 [7]F.Y.Lee and S.Shieh ,“Defending against spoofed DDoS attacks with path fingerprint”, Computers & Security 24, May, 2005, pp.571-586 [8]T.W.Doeppner, P.N.Klein, A.koyfman ,“Using Router Stamping to identify the Source of IP Packets”, In the ACM , Computer and Communications Security,Nov, 2000,pp.184-189 [9]J.Mirkovic,G.Prier,P.Reiher,“Attacking DDos at the Souce”, In Proc.ICNP 2002, Nov, 2002, pp.312-321 [10]A.C.Snoeren,C.Partidge,L.Sanchez,C.E.Jones,“Hash-Based IP Traceback”,In Proc.ACM SIGCOMM 2001 Conference, August, 2001, pp.3-14 [11]M.Adler,Amherst,“Tradeoffs in Probabilistic Packet Marking for IP Traceback”, In Proc. 34th ACM Symp. Theory of Computing, ACM Press, 2002, pp.407–418. L.Chen,Thomas,A.Longstaff,Kathleen,M, Carley, “Characterization of defense mechanisms against distributed denial of service attacks”, in the computers & Security,pp.665-678 [12]P.Almquist,“Type of service in the internet protocol suite RFC 1349”,July 1992 [13]K.Nichols, S.Blake, F.Baker,and D.Black, “Definition of the Differentiated Service field(DS field)in the IPv4 and IPv6 headers”,In RFC 2474,Dec,1998 [14]I.Stoica and H.Zhang,“Providing guaranteed services without per flow management”,In ACM SIGCOMM''99, May, 1999, pp.81-94 [15]Z.Gao,N.Ansari,K.Anantharam,“A New Marking Scheme to Defend against Distributed Denial of Service Attacks”,In the ACM, May, 2004, pp.2256-2260 [16]C.Jin,H.Wang,K.G.Shin,“Hop-Count Filter:An Effective Defense Against Spoofed”, In Proc.ACM, Computer and communications security, 2003,pp.30-41 [17]D.Dean, M.Franklin, A.Stubblefield .“An algebraic approach to IP traceback”,In ACM Trans, Information and System Security, vol.5, no.2, May ,2002, pp.119-137 [18]C.Douigeris, A.Mitrokotsa,“DDoS attacks and defense mechanisms: classification and state-of-the-art”,In Computer Networks ,vol.4,Apr,2005 ,pp.643- 666 [19]P.Ferguson,D.Senie,“Network Ingress filtering : defeating Denial of Service attacks which employ IP source address spoofing”,in:RFC 2827,2001 [20]S.Bellovin,“The ICMP Traceback message”, Internet Draft draft-bellovin-itrace-00.txt,March,2000 [21]D.Moore,G.Voelker,and S.Savage,“Inferring Internet Denial-of-Service Activity”, In Pro.USENIX Security Symposium, August 2001, pp.115-139 [22]R.Stone,“An IP Overlay Network for Tracking Dos Floods”,In Proc.USENIX Security Symposium, July, 2000, pp.199-212 [23] Belenky and N.Ansari,“IP Traceback with Deterministic Packet Marking”.IEEE Comm. Letters,vol.7, no.4, Apr, 2003, pp.162-164 [24]CAIDA, http://www.caida.org/tools/measurement/iffinder [25]L.Gao,“On inferring autonomous system relationships in the internet”,In IEEE/ACM, vol.9, December, 2001, pp.733-725 [26]L.Gao,J.Rexford,“Stable Internet Routing Without Global Coordination”,In IEEE/ACMTransactions on Networking (TON), vol.9,December , 2001, pp.681-69
|