|
[1]CNN, “DDoS attacks on Yahoo, Buy.com, eBay, Amazon, Datek,. E Trade”, CNN Headline News,. Feb. 7–11, 2000. [2]CERT Coordination Center, "Code Red II," http://www.cert.org/incident_notes/IN-2001-09.html [3]CERT Coordination Center, "Nimda worm," http://www.cert.org/advisories/CA-2001-26.html [4]B. Young, “MyDoom a Taste of Viruses to Come, Says Security Analyst,” Reuters, Feb, 2004. [5]The Trustees of Indiana University, “DDoS Resources”, http://www.anml.iu.edu/ddos/types.html. [6]CERT Coordination Center, “CERT Advisory CA-1996-21 TCP SYN Flooding and IP Spoofing Attacks,” Sep. 1996, http://www.cert.org/advisories/CA-1996-21.html. [7]CERT Coordination Center, “CERT Advisory CA-1996-01 UDP Port Denial-of-Service Attack”, February 8, 1996, http://www.cert.org/advisories/CA-1996-01.html. [8]Internet Relay Chat (IRC) help archive, “Denial of Service or "Nuke" Attacks”, February 8, 1996, http://www.irchelp.org/irchelp/nuke/info.html. [9]Insecure, “More Ping of Death information”, 21 October 1996, http://www.insecure.org/sploits/ping-o-death.html. [10]CERT Coordination Center, “CERT CA-1997-28 IP Denial-of-Service Attacks”, December 16, 1997, http://www.cert.org/advisories/CA-1997-28.html. [11]Rocky K. C. Chang, “Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial,” IEEE Communications Magazine, pp.42-51, Oct. 2002 [12]N. Daswani and H. Garcia-Molina, “Query-Flood DoS Attacks in Gnutella,” in the Proc. of CCS ’02, Washington, U.S.A., Nov. 2002, pp. 181-192. [13]“The Economic Impacts of Unacceptable Web-Site Download Speeds,” white paper, Zona Research Inc., Apr. 1999. http://www.keynote.com/resources/resource_library.html [14]Andrey Belenky and Nirwan Ansari, "On IP traceback", IEEE Communications Magazine, vol. 41, no. 7, Jul 2003 pp. 142-153. [15]S. M. Bellovin, “ICMP Traceback Messages,” IETF draft, 2000; http://www.research.att.com/smb/papers/draftbellovin-itrace-00.txt. [16]S. F. Wu et al., “On Design and Evaluation of ‘Intention-Driven’ ICMP Traceback,” Proc. 10th Int’l. Conf. Comp. Commun. and Nets., 2001, pp. 159–65. [17]S. Savage et al., “Network Support for IP Traceback,” IEEE/ACM Trans. Net., vol. 9, no. 3, June 2001, pp. 226–37. [18]Abraham Yaar et al., “Pi: A Path Identification Mechanism to Defend against DDoS Attacks,” in Proceedings of the IEEE Symposium on Security and Privacy 2003, 2003. [19]Manhee Lee et al., “A Source Identification Scheme against DDoS Attacks in Cluster Interconnects,” ICPP Workshops 2004: 354-361. [20]R. Stone, “Centertrack: An IP Overlay Network for Tracking DoS Floods,” Proc. 9th USENIX Sec. Symp., 2000, pp. 199–212. [21]A. C. Snoeren et al., “Single-Packet IP Traceback,” IEEE/ACM Trans. Net., vol. 10, no. 6, Dec. 2002, pp. 721–34. [22]H.Y. Chang et al., “Deciduous: Decentralized Source Identification for Network-Based Intrusions,” Proc. 6th IFIP/IEEE Int’l. Symp. Integrated Net. Mgmt., 1999. [23]H. Burch and B. Cheswick, “Tracing Anonymous Packets to Their Approximate Source,” Proc. USENIX LISA, 2000, pp. 319–27 [24]J. Xu and W. Lee, “Sustaining Availability of Web Services under Distributed Denial of Service Attacks,” IEEE Transactions on Computers, Vol. 52, No. 2, pp. 195-208, Feb. 2003. [25]P. Ferguson and D. Senie, “Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing,” May 2000, RFC 2827. [26]K. Park and H. Lee, “On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets,” in the Proc. of Sigcomm ’01, San Diego, California, USA Aug. 27-31, 2001, pp. 15-26. [27]T. Fukuda and T. Shibata, “Theory and applications of neural networks for industrial control systems”, Industrial Electronics, IEEE Transactions on, Volume 39, Issue 6, Dec. 1992 Page(s):472 – 489 [28]王進德 蕭大全, 類神經網路與模糊控制理論入門, 全華科技圖書股份有限公司, Sep. 2003. [29]W. Yen, "On Application-Level DDoS Attacks and Countermeasures," 2004 Symposium on Digital Life and Internet Technologies, Jun. 2004. [30]W. Yen and M. F. Lee, "Defending Application DDoS with Constraint Random," 2005 Asia-Pacific Conference on Communications, Oct. 2005, Perth, Western Australia, EI, Oct. 2005. [31]Christos Siaterlis and Vasilis Maglaris, “Detecting incoming and outgoing DDoS attacks at the edge using a single set of network characteristics”, Computers and Communications, 2005. ISCC 2005. Proceedings. 10th IEEE Symposium on 27-30, Page(s):469 – 475, June 2005
[32]R. Poli. Tournament selection, iterated coupon-collection problem, and backward-chaining evolutionary algorithms. In Proceedings of the Foundations of Genetic Algorithms Workshop (FOGA 8), 4th January 2005.
|