[1]LEE SC, SHIELDS C. Tracing the Source of Network Attack: ATechnical, Legal and Societal Problem[A]. Proceedings of the 2001 IEEE Workshop on Information Assurance and Security[C], 2001.[2]BELLOVIN SM. ICMP Traceback Messages[EB/OL]. InternetDraft: draftbellovinitrace00.txt, 2000.[3]SNOEREN AC, PARTRIDGE C, SANCHEZ LA, et al. HashBased IP Traceback[A]. Proceedings of the ACM SIGCOMM 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication[C], 2001.[4]SCHNACKENBERG D, DJAHANDARI K, STRENE D. Infrastructure for Intrusion Detection and Response[A]. Proceedings of DISCEX[C], 2000.[5]SAVAGE S, WETHERALL D, KARLIN A, et al. Network Support for IP Traceback[J]. ACM/IEEE Transactions on Networking, 2001,9(3):226-237.[6]SONG DX, PERRIG A. Advanced and Authenticated MarkingSchemes for IP Traceback[A]. Proceedings of InfoCom[C], 2001.[7]SUNG M, XU J. IP Tracebackbased Intelligent Packet Filtering: A Novel Technique for Defending Against Internet DDoS Attacks[A]. 10th IEEE International Conference on Network Protocols(ICNP)[C], Paris, France, 2002.[8]YAAR A, PERRIG A, SONG D. Pi: A Path Identification Mechanism to Defend against DDoS Attacks[A]. Proceedings of the IEEE Symposium on Security and Privacy[C], 2003.[9]The Network Simulator ns2[EB/OL]. http://www.isi.edu/nsnam/ns, 2004-12.[10]Internet mapping[EB/OL]. http://cm.belllabs.com/who/ches/map/dbs/index.html, 1999.[11]PARK K, LEE H. On the effectiveness of probabilistic packetmarking for IP traceback under denial of service attack[A]. Proceedings of IEEE INFOCOM01[C], 2001.338-347.[12]DEAN D, FRANKLIN M, STUBBLEFIELD A. An algebraic approach to IP traceback[A]. ACM Transactions on Information and System Security[C], 2002.[13]PENG T, LECKIE C, KOTAGIRI R. Adjusted Probabilistic Packet Marking For IP Traceback[R]. Department of Electrical and Electronic Engineering, University of Melbourne, Australia, 2001.[14]HUSSAIN A, HEIDEMANN J, PAPADOPOULOS C. A Framework for Classifying Denial of Service Attacks[R]. ISITR2003569, USC/Information Sciences Institute, 2003.[15]MAHAJAN R, BELLOVIN SM, FLOYD S,et al. Controlling High Bandwidth Aggregates in the Network[J]. ACM SIGCOMM CCR, 2002,32(3). |