|
[1]A. Belenky and N. Ansari, “Accommodating Fragmentation in Deterministic Packet Marking for IP Traceback,” IEEE Global Telecommunications Conference, vol. 3, pp. 1374–1378, Dec. 2003. [2]A. Belenky and N. Ansari, “IP traceback with deterministic packet marking,” IEEE Communications Letters, vol. 7, no. 4, pp. 162–164, April 2003. [3]A. Belenky and N. Ansari, “Tracing multiple attackers with deterministic packet marking (DPM),” IEEE Pacific Rim, vol.1, pp.49–52, Aug. 2003. [4]A.C. Snoeren, C. Partridge, L.A. Sanchez, C.E. Jones, F. Tchakountio, B. Schwartz, S.T. Kent, and W.T. Strayer, “Single-packet IP traceback,” IEEE/ACM Transactions on Networking, vol.10, no.6, pp.721–734, Dec. 2002. [5]A. Hussain, J. Heidemann, and C. Papadopoulos, “A Framework for Classifying Denial of Service Attacks,” in Proc. ACM SIGCOMM ’03, Karlsruhe, Germany, pp.99-110, Aug. 2003. [6]A. Yaar, A. Perrig, and D. Song, “FIT: Fast Internet Traceback,” in Proc. IEEE INFOCOM2005, vol. 2, pp.1395–1406, Mar. 2005. [7]Burton H. Bloom, “Space/Time Trade-offs in Hash Coding with Allowable Errors,” Communications of the ACM, vol. 13, no. 7, pp. 422-426, July 1970. [8]C. Gong and K. Sarac, “A More Practical Approach for Single-Packet IP Traceback Using Packet Logging and Marking,” IEEE Transactions on Parallel and Distributed Systems, vol. 19, no. 10, pp.1310-1324, Oct. 2008. [9]CIADA. (2003). CAIDA's Router-Level Topology Measurements [Online]. Available: http://www.caida.org/tools/measurement/skitter/router_topology/. [10]CAIDA. (2010). CAIDA’s skitter project. [Online]. Available: http://www.caida.org/tools/skitter/. [11]D. E. Knuth, The art of computer programming, volume 3: (2nd ed.) sorting and searching, Addision Wesley Longman Publishing Co., Inc., Redwood City, CA, 1998, pp. 513-558. [12]D. X. Song and A. Perrig, “Advanced and Authenticated Marking Chemes for IP Traceback,”IEEE INFOCOM2001, vol. 2, pp. 878-886, Apr. 2001. [13]H. Tian, J. Bi, X. Jiang and W. Zhang, “A Probabilistic Marking Scheme for Fast Traceback,” IEEE Computer Society 2010 Second International Conference on Evolving Internet, pp. 137–141, Sept. 2010. [14]I. Stocia and H. Zhang, “Providing Guaranteed Services Without Per Flow Management,” in Proc. ACM SIGCOMM’99, vol. 29, pp. 81-94, Oct. 1999. [15]J. Liu, Z.J. Lee and Y.C. Chung, “Dynamic Probabilistic Packet Marking for Efficient IP Traceback,” Computer Network, vol. 51, pp. 866-882, Feb. 2007. [16]K. H. Choi and H. K. Dai, “A Marking Scheme Using Huffman Codes for IP Traceback,”The 7th International Symposium on Parallel Architectures, Algorithms and Networks (SPAN’04), pp. 421-428, May 2004. [17]L. Zhang and Y. Guan, ”TOPO: A Topology-aware Single Packet Attack Traceback Scheme,”IEEE International Conference on Security and Privacy in Communication Networks (SecureComm 2006), pp. 1-10, Aug. 2006. [18]M.H. Yang and M.C. Yang, “RIHT: A Novel Hybrid IP Traceback Scheme,” IEEE Transactions on Information Forensics and Security , vol. 7, no. 4, pp. 789-797, Apr. 2012. [19]S. Malliga and A. Tamilarasi, “A Hybrid Scheme Using Packet Marking and Logging for IP Traceback,” International Journal of Internet Protocol Technology, vol. 5, no. 1/2, pp. 81-91, Apr. 2010. [20]S. Malliga and A. Tamilarasi, “A Proposal for New Marking Scheme with Its Performance Evaluation for IP Traceback,” WSEAS Transactions on Computer Research, vol. 3, no. 4, pp. 259-272, Apr. 2008. [21]S. Savage, D. Wetherall, A. Karlin, and T. Anderson, “Network Support for IP Traceback,” IEEE/ACM Transactions on Networking, vol. 9, no. 3, pp. 226-237, June 2001. [22]Security Assessment of the Internet Protocol Version 4, IETF RFC 6274, July 2011. [23]V.Paruchuri, A.Durresi and S.Chellapan, “TTL based Packet Marking for IP Traceback,” IEEE GLOBECOM 2008, pp. 1-5, Nov. 30 2008-Dec. 4 2008. [24]W. John and S. Tafvelin, “Analysis of Internet Backbone Traffic and Header Anomalies observed,”IMC’07: 7th ACM SIGCOMM conference on Internet measurement, pp. 111-116, 2007. [25]Ning Lu, Yulong Wang, Fangchun Yang, Maotong Xu, “A Novel Approach for Single-Packet IP Traceback Based on Routing Path,”pdp, pp.253-260, 2012 20th Euromicro International Conference on Parallel, Distributed and Network-based Processing, 2012. [26]Y. Wang, S. Su, Y. Yang, J. Ren, “A More Efficient Hybrid Approach for Single-Packet IP Traceback,” Parallel, Distributed and Network-Based Processing (PDP), 2012 20th Euromicro International Conference on. IEEE, 2012. [27]M.H. Yang, “Hybrid Single-Packet IP Traceback with Low Storage and High Accuracy,” The Scientific World Journal , Dec. 2013. [28]V. K. Soundar Rajam, and S. Shalinie. “A Novel Traceback Algorithm for DDoS Attack with Marking Acheme for Online System,” Recent Trends In Information Technology (ICRTIT), 2012 International Conference on. IEEE, 2012. [29]Saurabh S. and A.S. Sairam. “Linear and Remainder Packet Marking for fast IP traceback,” Communication Systems and Networks (COMSNETS), 2012 Fourth International Conference on. IEEE, 2012. [30]H. Tian, J. Bi, and P. Xiao. “A Flow-Based Traceback Scheme on an AS-Level Overlay Network,” Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on. IEEE, 2012. [31]E. Hilgenstieler, E.P. Duarte Jr., G. Mansfield-Keeni, N. Shiratori.“Extensions to The Source Path Isolation Engine for Precise and Efficient Log-based IP Traceback, ” Computers &; Security 29.4 (2010): 383-392.
|