|
[1]A. Appleby. (2010). Murmurhash. [Online]. Available: http://sites.google.com/site/murmurhash/. [2]A.Belenky and N. Ansari, “IP traceback with deterministic packet marking,” IEEE Communications Letters, vol. 7, no. 4, pp. 162–164, April 2003. [3]A.Belenky and N. Ansari, “Tracing multiple attackers with deterministic packet marking (DPM),” in Proc. IEEE PACRIM’03, Victoria, BC, Canada, Aug. 2003, pp. 49–52. [4]A. C. Snoeren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, B. Schwartz, S. T. Kent, and W. T. Strayer, “Single-packet IP traceback,” IEEE/ACM Transactions on Networking, vol. 10, no. 6, pp. 721–734, Dec. 2002. [5]A. Hussain, J. Heidemann, and C. Papadopoulos, “A Framework for Classifying Denial of Service Attacks,” in Proc. ACM SIGCOMM ’03, Karlsruhe, Germany, Aug. 2003, pp. 99-110. [6]A. Yaar, A.Perrig, and D.Song, “FIT: Fast Internet Traceback,” in Proc. IEEE INFOCOM2005, Miami, FL, USA, Mar. 2005, pp. 1395–1406. [7]B. Al-Duwari and M. Govindarasu, “Novel hybrid schemes employing packet marking and logging for IP traceback,” IEEE Transactions on Parallel and Distributed Systems, vol. 17, no. 5, pp. 403-418, May 2006. [8]CAIDA. (2010). CAIDA’s skitter project. [Online]. Available: http://www.caida.org/tools/skitter/. [9]C. Gong and K. Sarac, “A More Practical Approach for Single-Packet IP Traceback Using Packet Logging and Marking,” IEEE Transactions on Parallel and Distributed Systems, vol. 19, no. 10, pp.1310-1324, Oct. 2008. [10]D. E. Knuth, The art of computer programming, volume 3: (2nd ed.) sorting and searching, Addison Wesley Longman Publishing Co., Inc., Redwood City, CA, 1998, pp. 513–558. [11]D. X. Song and A. Perrig, “Advanced and authenticated marking schemes for IP traceback,” in Proc. IEEE INFOCOM2001, Anchorage, Alaska, USA, Apr. 2001, pp. 878-886. [12]H. Burch and B. Cheswick, “Tracing anonymous packets to their approximate source,” in Proc. USENIX LISA 2000, New Orleans, USA, Dec. 2000, pp. 319–327. [13]I. Stocia and H. Zhang, “Providing guaranteed services without peer flow management,” in Proc. ACM SIGCOMM’99, Boston, MA, USA, Sept. 1999, pp. 81-94. [14]K. H. Choi and H. K. Dai, “A Marking Scheme Using Huffman Codes for IP Traceback,” in Proc. The 7th International Symposium on Parallel Architectures, Algorithms and Networks (SPAN’04), Hong Kong, SAR, China, May 2004, pp. 421-428. [15]L. C. Noll (2010). FNV Hash. [Online]. Available: http://www.isthe.com/chongo/tech/comp/fnv/index.html. [16]L. Zhang and Y. Guan, ”TOPO: A Topology-aware Single Packet Attack Traceback Scheme,” in Proc. IEEE International Conference on Security and Privacy in Communication Networks (SecureComm 2006), Baltimore, Maryland, USA, Aug. 2006, pp. 1-10. [17]S. Malliga and A. Tamilarasi, “A hybrid scheme using packet marking and logging for IP traceback,” International Journal of Internet Protocol Technology, vol.5, no. 1/2, pp.81-91, Apr. 2010. [18]S. Malliga and A. Tamilarasi, “A proposal for new marking scheme with its performance evaluation for IP traceback,” WSEAS Transactions on Computer Research, vol.3, no. 4, pp.259-272, Apr. 2008. [19]S. M. Bellovin, M. D. Leech, and T. Taylor, “ICMP Traceback Messages,” Internet Draft: draft-ietf-itrace-04.txt, Feb. 2003. [20]S. Savage, D. Wetherall, A. Karlin, and T. Anderson, “Practical Network Support for IP Traceback” in Proc. ACM SIGCOMM2000, Stockholm, Sweden, Aug. 2000, pp. 295-306. [21]The MD5 Message-Digest Algorithm, IEFT RFC 1321, 1992. [22]X. J. Wang and Y. L. Xiao, “IP Traceback Based on Deterministic Packet Marking and Logging,” in Proc. SCALCOM-EMBEDDEDCOM'09, Dalian, China, Sept. 2009, pp.178-182.
|