|
[1] Y. Chen, Y. -K. Kwok, and K. Hwang, “MAFIC: Adaptive Packet Dropping for Cutting Malicious Flows to Push Back DDoS Attacks,” Proc. of 25th IEEE Int' Conf. Distributed Computing Systems Workshops 2005, June 2005. [2] Naqamalai, D. Dhinakaran, C. Jae Kwang Lee, “Multi Layer Approach to Defend DDoS Attacks Caused by Spam,” Proc. of International Conf. of Multimedia and Ubiquitous Engineering, April, 2007. [3] Dhinaharan Naqamalai, Cynthia Dhinakaran and Jae Kwang Lee, “Novel Mechanism to Defend DDoS Attacks Caused by Spam,” International Journal of Smart Home, Vol. 1, No. 2, July 2007, pp.83-95. [4] X. Geng and A. B. Whinston, “Defeating Distributed Denial of Service Attacks,” IT Pro, July-August 2000. [5] A. Legout, E.W. Biersack, “Revisiting the Fair Queuing Paradigm for End-to-end Congestion Control,” IEEE Network, Volume 16, Issue 5, Sept.-Oct. 2002. [6] K. Park and H. Lee, “On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets,” Proc. of ACM SIGCOMM 2001, Aug. 2001. [7] K. Park and H. Lee, “On the Effectiveness of Probabilistic Packet Marking for IP Traceback under Denial of Service Attacks,” Proc. of IEEE INFOCOM 2001, Mar. 2001. [8] M. Song and J. Xu, “IP Traceback-Based Intelligent Packet Filtering: A Novel Technique for Defending against InternetDDoS Attacks,” Proc. of 10th IEEE Int’l Conf. Network Protocols (ICNP 2002), Nov. 2002. [9] Bao-Tung Wang, H. Schulzrinne, “An IP traceback mechanism for reflective DoS attacks,” Proc. of IEEE Electrical and Computer Engineering 2004, May 2004. [10] H. Wang, D. Zhang, and K.G. Shin, “SYN-dog: Sniffing SYN Flooding Sources,” Proc. of 22nd Int’l Conf. Distributed Computing Systems (ICDCS ’02), July 2002. [11] Tu Xu; Da Ke He; Yu Zheng, “Detecting DDOS Attack Based on One-Way Connection Density,” Proc. of IEEE ICCS 2006, Oct. 2006. [12] http://www.isi.edu/nsnam/ns/ [13] http://en.wikipedia.org/wiki/Harmonic_Mean [14] http://en.wikipedia.org/wiki/SYN_flood
|