|
References
[1] L. Garber, “Denial-of-Service Attacks Rip the Internet,” Computer, vol. 33, pp.12-17, Apr. 2000. [2] J. Howard, “An Analysis of Security Incidents on the Internet,” Carnegie Mellon Univ., Aug. 1998. [3] I. Kotenko. “Multi-agent Simulation of Attacks and Defense Mechanisms in Computer Networks,” The Journal of Computing, Vol. 7, Issue 2, pp.35-43, 2008. [4] CNN, “DDoS attacks on Yahoo, Buy.com, eBay, Amazon, Datek,. E Trade,” CNN Headline News,. Feb. 7–11, 2000. [5] CERT Coordination Center, “Code Red II,” Sept. 2001. http://www.cert.org/incident_notes/IN-2001-09.html [6] CERT Coordination Center, “Nimda worm,” Sept. 2001. http://www.cert.org/advisories/CA-2001-26.html [7] B. Young, “MyDoom a Taste of Viruses to Come, Says Security Analyst,” Reuters, Feb. 2004. [8] J. Markoff, “Before the Gunfire, Cyberattacks,” Aug. 2008 http://www.nytimes.com/2008/08/13/technology/13cyber.html [9] Shachtman, “Activists Launch Hack Attacks on Tehran Regime,” Noah, Jun. 2009.http://www.wired.com/dangerroom/2009/06 /activists-launch-hack-attacks-on-tehran-regime/. [10] CERT Coordination Center, “CERTR Incident Note IN-99-07 Distributed Denial of Service Tools,” Jan. 1999. [11] D. Dittrich, “The DoS Project’s trinoo distributed denial of service attack tool,” Oct. 1999. [12] D. Dittrich, “The Tribe Flood Network distributed denial of service attack tool,” Oct. 1999. [13] B. Schneier, “Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish),” Proccedings of Fast Software Encryption, Cambridge Security Workshop, pp. 191–204. Springer-Verlag, 1994. [14] J. Barlow and W. Thrower, “TFN2K - An Analysis,” Feb. 2000. [15] CERT Coordination Center, “CERTR Advisory CA-1999-17 Denial-of-Service Tools,” Dec. 1999. [16] P. Ferguson and D. Senie, “Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing,” Internet Engineering Task Force, RFC 2827, May. 2000. [17] CERT Coordination Center, “CERTR Advisory CA-2000-01 Denial- of-Service Developments,” Jan. 2000. [18] D. Dittrich, “The stacheldraht distributed denial of service attack tool,” Dec. 1999. [19] CERT, "TCP SYN Flooding and IP Spoofing Attacks," Advisory CA-96-21, Sept. 1996. [20] C. Schuba et al., "Analysis of a Denial of Service Attack on TCP," Proc. 1997 IEEE Symp. Security and Privacy, 1997.Distributed Denial-of-Service Attacks,” CoRR, vol. cs.NI/0403042, 2004. [21] J. Jung, B. Krishnamurthy, M. Rabinovich. “Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites,” The Eleventh International World Wide Web Conference, Honolulu, Hawaii, May. 2002. [22] S. Gibson, “The Strange Tale of the Denial of Service Attacks against GRC.COM,” http://grc.com/dos/grcdos.htm, 2002. [23] Andrey Belenky and Nirwan Ansari, “On IP Traceback,” IEEE Communication Magazine, pp. 142-153, July. 2003. [24] Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioammidis, Vern Paxson and Scott Shenker, “Aggregate-Base Congestion Control,” ICSI Center for Internet Research (ICIR) AT&T Labs Research. [25] John Ioammidis and Steven M. Dellovin, “Implementing Pushback: Router-Based Defense Against DDoS Attack,” Proc. Network and Distributed System Security Symp., pp.6–8. [26] Ju Wang, Linyuan Lu and Andrew A. Chien, “Tolerating Denial -of-Service Attacks Using Overlay Networks – Impact of Topology,” ACM SSRS 2003, Oct. 2003. [27] A. D. Keromytis, V. Misra, and D. Rubenstein, “SOS: Secure Overlay Services,” Proc. ACM SIGCOMM, pp. 61-72, Aug. 2002. [28] A. D. Keromytis, V. Misra, and D. Rubenstein, “SOS: An Architecture for Mitigating DDoS Attacks,” IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, Vol. 22, No. 1, Jan. 2004.
|