|
[1]Computer Emergency Response Team Coordination Center, CERT/CC, http://ww.cert.org. [2]Taiwan Computer Emergency Response Team Coordination Center, TWCERT/CC, http://www.cert.org.tw. [3]CERT/CC Overview Incident and Vulnerability Trends, CERT Coordination Center, Pittsburgh, http://www.cert.org/present/cert-overview-trends/, 2002. [4]McAfee, Inc., http://vil.nai.com/vil/default.asp. [5]D. Moore, G..M. Voelker, and S. Savage, “Inferring Internet denial-of-service activity”, Proceedings of 10th USENIX Security Symposium, Washington, DC, 2001. [6]Jelena Mirkovic, Janice Martin, and Peter Reiher, “A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms,” UCLA Technical Report #020018, 2002. [7]Rocky K. C., Chang, “Defending against flooding-based distributed denial-of-service attack: a tutorial,” IEEE Communication Magazine, Vol. 40, pp. 42-51, Oct. 2002. [8]CERT Advisory CA-2003-04 MS-SQL Server Worm, http://www.cert.org/advisories/CA-2003-04.html. [9]CERT Advisory CA-1996-21 TCP SYN Flooding and IP Spoofing Attacks, http://www.cert.org/advisories/CA-1996-21.html. [10]D. Senie, “Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing”, RFC 2827, http://www.ietf.org/rfc/rfc2827.txt, May 2000. [11]CERT Advisory CA-1996-01 UDP Port Denial-of-Service Attacks, http://www.cert.org/advisories/CA-1996-01.html. [12]CERT Advisory CA-1998-01 Smurf IP Denial-of-Service Attacks, http://www.cert.org/advisories/CA-1998-01.html. [13]CERT Advisory CA-1997-28 IP Denial-of-Service Attacks, http://www.cert.org/advisories/CA-1997-28.html. [14]D. Schnackenberg, K. Djahandari, and D. Sterne, “Infrastructure for intrusion detection and response”, Proceedings of DARPA Information Survivability Conference and Exposition (DISCEX), South Carolina, Jan. 2000. [15]Thomas R., Mark B., Johnson T., Croall, J.,"NetBouncer: client-legitimacy-based high-performance DDoS filtering," Proceedings of Conference and Exposition on DARPA Information Survivability, Washington, DC, vol.1, pp. 14-25, April 2003. [16]M. Roghan, D. Veitch, and P. Abry. “Real-time estimation of the parameters of long-range dependence,” IEEE/ACM RANS. on Networking, Vol.8, pp 467-478,Aug. 2000. [17]K. Fox, R. Henning, J. Reed, and R. Simonian, “A Neural Network Approach Towards Intrusion Detection,” Technical Report, Harris Corporation, July 1990. [18]T. M. Gil and M. Poletto, “MULTOPS: a data-structure for bandwidth attack detection,” Proceedings of 10th Usenix Security Symposium, Washington, DC, August 2001. [19]P. Barford, J. Kline, D. Plonka and A.Ron, “A signal analysis of network traffic anomalies,” Internet Measurement Workshop, Marseille, FranceNov. 2002. [20]L. Feinstein, D. Schnackenberg, R. Balupari, and D. Kindred, "Statistical Approaches to DDoS Attack Detection and Response," Proceedings of DISCEX 3, April 2003. [21]Jiejun Kong; Mirza, M.; Shu, J.; Yoedhana, C.; Gerla, M.; Songwu Lu, "Random flow network modeling and simulations for DDoS attack mitigation," Proceedings of ICC IEEE International Conference on Communications, Alask, USA, vol.1, pp. 487 - 491, 11-15 May 2003. [22]T. Peng, C. Leckie and R. Kotagiri, "Protection from Distributed Denial of Service Attack Using History-based IP Filtering," Proceedings of IEEE International Conference on Communications, Anchorage, Alaska, USA, May 2003. [23]Belenky, A.; Ansari, N., "On IP traceback," IEEE Communications Magazine, vol.41, pp.142-153, July 2003. [24]Minho Sung; Jun Xu, "IP traceback-based intelligent packet filtering: a novel technique for defending against Internet DDoS attacks," IEEE Transactions on Parallel and Distributed Systems, vol.14, pp. 861-872, Sept. 2003. [25]H. Burch and B. Cheswick, “Tracing anonymous packets to their approximate source,” Proceedings of the 14th Systems Administration Conference, New Orleansm Louisiana, U.S.A., December 2000. [26]M.Oe, "A hierarchical architecture for IP Traceback," Proceedings of 54th IETF, BoF, Yokohama, Japan, , Jul. 2002. [27]A. Yaar, A. Perrig, and D. Song, “PI: A Path Identification Mechanism to Defend against DDoS Attacks,” Proceedings of IEEE Symposium on Security and Privacy, pp. 93-107, May 2003. [28]R. Russell and H. Welte, “Linux Netfilter Hacking HOWTO,” http://www.netfilter.org/documentation/HOWTO/netfilter-hacking-HOWTO.html. [29]B. Hubert, “Linux Advanced Routing and Traffic Control HOWTO,” http://lartc.org/howto/. [30]S. Ioannidis, A. D. Keromytis, S. M. Bellovin, and J. M. Smith, “Implementing a Distributed Firewall”, Proceedings of 7th ACM Conference on Computer and Communication Security, Athens, Greece, Nov. 2000. [31]M. Roesch, “Snort - Lightweight Intrusion Detection for Networks,” Proceedings of the 13th Systems Administration Conference (LISA'99), USENIX Association, pp. 229-238, 1999. [32]K. Hwang and M. Gangadharan, “Micro-Firewalls for Dynamic Network Security with Distributed Intrusion Detection,” Proceedings of IEEE International Symposium on Network Computing and Applications, pp. 68-79, Oct. 2001. [33]M. Gangadhran and K. Hwang, “Intranet Secuity with Micro-Firewalls and Mobil Agent for Proactive Intrusion Response,” Proceedings of IEEE Int’l Conferences on Computer Networks and Mobile Computing, Beijing, China, Oct. 2001. [34]Wei Yu, Dong Xuan, Wei Zhao, "Middleware-based approach for preventing distributed deny of service attacks," Proceedings of MILCOM, vol. 2, pp.1124-1129, Oct. 2002. [35]J. Mirkovic, G. Prier and P. Reiher, “Attacking DDoS at the Source,” Proceedings of ICNP, pp. 312-321, Paris, France, November 2002. [36]Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, and Scott Shenker, “Controlling High Bandwidth Aggregates in the Network,” Computer Communications Review 32:3, pp. 62-73, July 2002. [37]John Ioannidis and Steven M. Bellovin, “Implementing Pushback: Router-Based Defense DDoS Attacks”, Proceedings of NDSS, February 2002. [38]K. Park and H. Lee, “On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets,” Proceedings of ACM SIGCOMM, August 2001. [39]J. Ioannidis and S. M. Bellovin, “Pushback: Router-Based Defense Against DDoS Attacks,” Proceedings of NDSS, February 2002. [40]CERT, Intruder Detection Checklist, Jul 20, 1999. http://www.cert.org/tech_tips/intruder_detection_checklist.html. [41]G. Vigna, R.A. Kemmerer, and P. Blix, "Stateful Intrusion Detection for High-Speed Networks," Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID 2001), pp.69-84, Springer-Verlag avis, CA, Oct. 2001. [42]Byeong Kil Lee and Lizy John, "NpBench: A Benchmark Suite for Control Plane and Data Plane Applications for Network Processors," Proceedings of the International Conference on Computer Design (ICCD'03), San Jose, Oct. 2003. [43]BroadWeb, http://www.broadweb.com.tw.
|