[1]
EHRENKRANZ T,LI J. On the state of IP spoofing defense [J]. ACM Transactions on Internet Technology,2009,9(2):1-29.
[2]
SAVAGE S,WETHERALL D,KARLIN A,et al.Practical network support for IP traceback [ C] // Proceedings of the ACM SIGCOMM 2000 Conference on Applictions,Technologies,Arehitectures,and Protocols for Computer Communication. New Youk:ACM,2000:295-306.
[3]
李德全,苏璞睿,魏东梅.基于路由器编码的自适应包标记 [J].软件学报,2007,18(10):2652-2661.
[4]
闫巧,宁土文.重叠哈希分片的概率包标记方法 [J].计算机工程,2011,37(11):11-14.
[5]
章海聪,王晓明. 基于路由器接口的IP追踪方案 [J].JOCA,2011,31(3):774-777.
[6]
徐劲松.一种改进的路由包标记追踪方案 [J].JOCA,2009,29(5):1316-1320.
[7]
XI ANGY,ZHOU W L,GUO M Y. Flexible deterministic packet marking:An IP traceback system to find the real source of attacks [J]. IEEE Transactions on Parallel and Distributed System,2009,20(5):567-580.
[8]
MUTHUPRASANNA M,MANIMARAN G,MANZOR M,et al.Coloring the Internet:IP traceback [C] // Proceedings of the 12th International Conference on Parallel and Distributed Systems. Washington,DC:IEEE Computer Society,2006:589-598.
[9]
GONG C,SARAC K. A more practical approach for single-packet IP traceback using packet logging and marking [J].IEEE Transactions on Parallel and Distributed System,2008,19(10):1310-1324.
[10]
揭摄,孙乐昌.一种新的非重复性包标记IP追踪方案 [J] .计算机工程, 2007, 33(10):105-107.
[11]
LIU J,LEE Z-J,CHUNG Y-C. Dynamic probabilistic packet marking for efficient IP traceback [J]. The International Journal of Computer and Telecommunications Networking,2007,51(3):866-882.
[12]
CHEN R L,PARK J M, MARCHANY R,et al.RIM:Router interface marking for IP traceback [C] // Global Telecommunications Conference. San Francisco,USA:IEEE,2006:1-5.
[13]
SNOEREN A C,PARTRIDGE C,SANCHEZ L A,et al.Hash-based IP traceback [C] // Proceedings of the ACM SIGCOMM 2001 Conference on Applications,Technologies, Architectures,and Protocols for Computer Communication. New Youk:ACM Press,2001:3-14.
[14]
李德全,苏璞睿,冯登国.用于IP跟踪的包标记的注记[J]. 软件学报,2004,15(2):250-258.
[15]
李德全,徐一丁,苏璞睿,等. IP追踪中的自适应包标记 [J]. 电子学报,2004,32(8):1334-1337. |