[1] DOULIGERIS C, MITROKOTSA A. DDoS attacks and defense mechanisms:classification and state-of-the-art[J]. Computer Networks, 2004, 44(5):643-666. [2] SAVAGE S, WETHERALL D, KARLIN A, et al. Practical network support for IP traceback[J]. Journal of Clinical Epidemiology, 2001, 30(4):295-306. [3] SONG D X, PERRIG A. Advanced and authenticated marking schemes for IP traceback[C]//Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies. Piscataway, NJ:IEEE, 2001:878-886. [4] GOODRICH M T. Probabilistic packet marking for large-scale IP traceback[J]. IEEE/ACM Transactions on Networking, 2008, 16(1):15-24. [5] WANG X J, WEI S J. IP traceback based probabilistic packet marking and randomized network coding[C]//Proceedings of the 2nd International Workshop on Computer Science and Engineering. Piscataway, NJ:IEEE, 2009:151-154. [6] SATTARI P, GJOKA M, MARKOPOULOU A. A network coding approach to IP traceback[C]//Proceedings of the 2010 IEEE International Symposium on Network Coding. Piscataway, NJ:IEEE, 2010:1-6. [7] 闫巧,宁土文.基于矩阵边采样的IP追踪[J].深圳大学学报(理工版),2012,29(5):399-404.(YAN Q, NING T W. IP traceback with matrix edge sampling[J]. Journal of Shenzhen University (Science and Engineering), 2012, 29(5):399-404.) [8] DONOHO D L. Compressed sensing[J]. IEEE Transactions on Information Theory, 2006, 52(4):1289-1306. [9] CANDES E J, ROMBERG J, TAO T. Robust uncertainty principles:exact signal reconstruction from highly incomplete frequency information[J]. IEEE Transactions on Information Theory, 2006, 52(2):489-509. [10] GOLD R. Optimal binary sequences for spread spectrum multiplexing[J]. IEEE Transactions on Information Theory, 1967, 13(4):619-621. [11] LI S, GAO F, GE G, et al. Deterministic construction of compressed sensing matrices via algebraic curves[J]. IEEE Transactions on Information Theory, 2012, 58(8):5035-5041. [12] 万哲先.代数和编码[M].3版.北京:高等教育出版社,2007:219-249.(WAN Z X. Algebra and Coding Theory[M]. 3th ed. Beijing:Higher Education Press, 2007:219-249.) [13] GOPPA V D. Codes on algebraic curves[J]. Soviet Math Doklady, 1981, 259(6):1289-1290. [14] 蒋玲. IP追踪及攻击源定位技术研究[D].广州:广东工业大学,2011:45-48.(JIANG L. Research on IP traceback technology based on DDoS attack[D]. Guangzhou:Guangdong University of Technology, 2011:45-48.) [15] BELLOVIN S, LEECH M, TAYLOR T. ICMP traceback messages[EB/OL].[2013-11-26]. http://www3.ietf.org/Proceedings/01dec/I-D/draft-ietf-itraee-ol.txt. |