|
1.Al-Kaltham, K.A.-T.a.I.A., "Evaluation and testing of internet firewalls," Int. J. Netw. Manag. Journal, Vol. 14, 1999, pp. 135-149. 2.Belenky, A. and N. Ansari., "Tracing multiple attackers with deterministic packet marking (DPM)," in Communications, Computers and signal Processing, 2003. PACRIM. 2003 IEEE Pacific Rim Conference on. Vol. 1, 2003, pp. 49-52. 3.Chang, R. K. C., "Defending against flooding-based distributed denial-of-service attacks: a tutorial," in Communications Magazine, IEEE. Journal, Vol. 40, 2002, pp. 42-51 4.Jacobson, S.F.a.V., "Random early detection gateways for congestion avoidance." IEEE/ACM Trans. Netw., Vol. 1, 1993, pp. 397--413. 5.Oe, M., Y. Kadobayashi, and S. Yamaguchi. "An implementation of a hierarchical IP traceback architecture." in Applications and the Internet Workshops. 2003. pp. 250 – 253. 6.Regan, J., "An Introduction to Using Linux as a Multipurpose Firewall." Linux J., Vol. 2000, 2000, pp. 40. 7.Reiher, J.M.a.P., "A taxonomy of DDoS attack and DDoS defense mechanisms." SIGCOMM Comput. Commun. Rev., Vol. 34, 2004, pp. 39-53. 8.Shin, C.J.a.H.W.a.K.G. "Hop-count filtering: an effective defense against spoofed DDoS traffic." in CCS '03: Proceedings of the 10th ACM conference on Computer and communications security. 2003, pp.30-41. 9.Stolfo, W.L.a.S.J., "A framework for constructing features and models for intrusion detection systems." ACM Trans. Inf. Syst. Secur., Vol. 3, 2000, pp. 227-261. 10.Denial-of-Service Attack via ping, Cert Coordination Center, http://www.cert.org/advisories/CA-1996-26.html. 11.Denial of Service Attacks, Cert Coordination Center, http://www.cert.org/tech_tips/denial_of_service.html. 12.Distributed Denial of Service (DDoS) Attacks/tools, http://staff.washington.edu/dittrich/misc/ddos/. 13.IP Denial-of-Service Attack, Cert Coordination Center, http://www.cert.org/advisories/CA-1997-28.html. 14.Mstream, Cert Coordination Center, http://www.cert.org/incident_notes/IN-2000-05.html. 15.Queueing Disciplines for Bandwidth Management, http://lartc.org/howto/lartc.qdisc.classless.html. 16.RFC 1631, Network Address Translator, http://www.faqs.org/rfcs/rfc1631.html, 1994. 17.RFC 768, User Datagram Protocol, http://www.faqs.org/rfcs/rfc768.html, 1980. 18.RFC 791, Internet Protocol, http://www.faqs.org/rfcs/rfc791.html, 1981. 19.RFC 792, Internet Control Message Protocol, http://www.faqs.org/rfcs/rfc792.html,1981. 20.RFC 793, Transmission Control Protocol, http://www.faqs.org/rfcs/rfc793.html, 1981. 21.stacheldrahtV4, http://packetstormsecurity.org/distributed/ 22.TCP SYN Flooding and IP Spoofing Attacks, Cert Coordination Center, http://www.cert.org/advisories/CA-1996-21.html. 23.TFN, TFN2K, Cert Coordination Center, http://www.cert.org/advisories/CA-1999-17.html. 24.Trinoo, Tribe Flood Network, Cert Coordination Center,
|