References
- L. Garber. 'Denial-of-service attacks trip the Internet'. Computer, pages 12, Apr. 2000
- Computer Emergency Response Team, 'TCP SYN flooding and IP Spoofing attackts,' CERT Advisory CA-1996-21, Sept, 1996
- P. Ferguson and D. Senie. 'Network ingress Filtering: Defeating denial of service attacks which employ IP source address spoofing', May 2000. RFC 2827
- K. Park and H. Lee. On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack, In Proc. IEEE INFOCOM '01, Pages 338-347, 2001
- D. X. Song, A. Perrig, 'Advanced and Authenticated Marking Scheme for IP Traceback,' Proc, Infocom, vol. 2, pp.878-886, 2001
- Steve Bellovin, Tom Taylor, 'ICMP Traceback Messages' , RFC 2026, Internet Engineering Task Force, February 2003
- Stefan Savage, David Wetherall, Anna Karlin and Tom Anderson, 'Practical Network Support for IP Traceback', Technical Report UW-CSE-2000-02-01, Department of Computer Science and Engineering, University of Washington
- R. Stone, 'CenterTrack: an IP overlay network for tracking DoS floods,' Proc, 9th Usenix Security Symp., Aug., 2000
- A.C. Snoeren, C. Partridge, L.A. Sanchez, W.T. Strayer, C.E. Jones, F. Tchakountio, and S.T. Kent, 'Hash-Based IP Traceback', BBN Technical Memorandum No. 1284, February 7, 2001
- H. Y. Chang et al., 'Deciduous : Decentralized Source Identification for Network-based Intrusions,' Proc, 6th IFIP/IEEE Int'l Symp., Integrated Net., Mmgt, 1999
- Deering, S. and R. Hinden, 'Internet Protocol, Version 6, (IPv6) Specification', RFC 2460, December 1998
- Tatsuya Baba, Shigeyuki Matsuda, 'Tracing Network Attacks to Their Sources,' IEEE Internet Computing, pp.20-26, March, 2002
- Andrey Belenky, Nirwan Ansari, 'On IP Traceback,' IEEE Communication Magazine, pp.142-153, July, 2003
- W. Lee and K. Park, 'On the Effectiveness of Route Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets,' Proc. SIGCOMM, ACM Press, pp. 15-26., 2001