[1] CONVERY S. Network security architectures [M]. TIAN G, LIU D, translated. Beijing: Posts and Telecom Press, 2013: 234-245.(CONVERY S.网络安全体系结构[M].田果, 刘丹宁, 译.北京:人民邮电出版社, 2013:234-245.) [2] BASKAR M, GNANASEKARAN T, SARAVANAN S. Adaptive IP traceback mechanism for detecting low rate DDoS attacks [C]//ICE-CCN:Proceedings of the 2013 International Conference on Emerging Trends in Computing, Communication and Nanotechnology. Piscataway: IEEE, 2013: 373-377. [3] FOROUSHANI V A, ZINCIR-HEYWOOD A N. TDFA: traceback-based defense against DDoS flooding attacks [C]//Proceedings of the 2014 IEEE 28th International Conference on Advanced Information Networking and Applications. Piscataway: IEEE, 2014: 597-604. [4] KIREMIRE A R, BRUST M R, PHOHA V V. Topology-dependent performance of attack graph reconstruction in PPM-based IP traceback [C]//Proceedings of the 2014 IEEE 11th Consumer Communications and Networking Conference. Piscataway: IEEE, 2014: 363-370. [5] SAVAGE S, WETHERALL D, KARLIN A, et al. Practical network support for IP traceback [J]. ACM SIGCOMM Computer Communication Review, 2000, 30(4):295-306. [6] SONG D X, PERRIG A. Advanced and authenticated marking schemes for IP traceback [C]//INFOCOM 2001: Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies. Piscataway: IEEE, 2001, 2: 878-886. [7] PENG T, LECKIE C, RAMAMOHANARAO K. Adjusted probabilistic packet marking for IP traceback [C]//NETWORKING 2002: Proceedings of the Second International IFIP-TC6 Networking Conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications, LNCS 2345. Berlin: Springer, 2002: 698-708. [8] LIU J, LEE Z-J, CHUNG Y-C. Dynamic probabilistic packet marking for efficient IP traceback [J]. Computer Networks, 2007, 51(3): 866-882. [9] ZHU X, LIU Y, LI X. IP traceback based on unrepeatable packet marking scheme [J]. Journal of Computer Applications, 2007, 27(11): 2694-2695, 2698.(朱晓建, 刘渊, 李秀珍.基于非重复包标记的 IP 追踪研究[J].计算机应用, 2007, 27(11):2694-2695, 2698.) [10] ZHANG M, ZHAO H, XIONG A. New scheme for IP traceback [J].Computer Engineering and Applications, 2011, 47(30): 83-85, 97. (张敏, 赵红杰, 熊安萍.一种新的IP溯源追溯方案[J].计算机工程与应用, 2011, 47(30):83 -85, 97.) [11] JIN N. Improved packet marking scheme under DDoS attacks [D]. Chengdu: University of Electronic Science and Technology of China, 2013. (靳娜.DDoS 攻击下的数据包标记优化方案的研究[D]. 成都:电子科技大学, 2013.) [12] MCCLURE S, SCAMBRAY J, KURTZ G. Hacking exposed [M]. 7th ed. ZHAO J, ZHANG Y, CHEN H, et al., translated. Beijing:Tsinghua University Press, 2013: 692-695. (STUART M, JOEL S, GEORGE K. 黑客大曝光[M].7 版.赵军, 张云春, 陈红松, 等译.北京:清华大学出版社, 2013:692-695.) [13] CHEN L, HE M, LIU Z, et al. A new active path identification and filtering method [C]//Proceedings of the 2013 27th International Conference on Advanced Information Networking and Applications Workshops. Piscataway: IEEE, 2013: 849-853. [14] TANENBAUM A S, WETHERALL D J. Computer networks [M]. 5th ed. YAN W, PAN A, translated. Beijing: Tsinghua University Press, 2012: 261-266. (TANENBAUM A S, WETHERALL D J.计算机网络[M].5版.严伟, 潘爱民, 译.北京: 清华大学出版社, 2012:261-266.) [15] HUANG Q, XIONG W, YANG X, et al. Hierarchical stateless single-packet IP traceback technique [J].Journal on Communications, 2011, 32(3): 150-157.(黄琼, 熊文柱, 杨晓龙, 等.分层次的无状态单分组IP溯源技术[J].通信学报, 2011, 32(3):150-157.) |