1 |
P. Ferguson and D. Senie. 'Network ingress Filtering: Defeating denial of service attacks which employ IP source address spoofing', May 2000. RFC 2827
|
2 |
Steve Bellovin, Tom Taylor, 'ICMP Traceback Messages' , RFC 2026, Internet Engineering Task Force, February 2003
|
3 |
H. Y. Chang et al., 'Deciduous : Decentralized Source Identification for Network-based Intrusions,' Proc, 6th IFIP/IEEE Int'l Symp., Integrated Net., Mmgt, 1999
|
4 |
R. Stone, 'CenterTrack: an IP overlay network for tracking DoS floods,' Proc, 9th Usenix Security Symp., Aug., 2000
|
5 |
W. Lee and K. Park, 'On the Effectiveness of Route Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets,' Proc. SIGCOMM, ACM Press, pp. 15-26., 2001
|
6 |
D. X. Song, A. Perrig, 'Advanced and Authenticated Marking Scheme for IP Traceback,' Proc, Infocom, vol. 2, pp.878-886, 2001
|
7 |
L. Garber. 'Denial-of-service attacks trip the Internet'. Computer, pages 12, Apr. 2000
|
8 |
Deering, S. and R. Hinden, 'Internet Protocol, Version 6, (IPv6) Specification', RFC 2460, December 1998
|
9 |
Stefan Savage, David Wetherall, Anna Karlin and Tom Anderson, 'Practical Network Support for IP Traceback', Technical Report UW-CSE-2000-02-01, Department of Computer Science and Engineering, University of Washington
|
10 |
K. Park and H. Lee. On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack, In Proc. IEEE INFOCOM '01, Pages 338-347, 2001
|
11 |
Andrey Belenky, Nirwan Ansari, 'On IP Traceback,' IEEE Communication Magazine, pp.142-153, July, 2003
|
12 |
Tatsuya Baba, Shigeyuki Matsuda, 'Tracing Network Attacks to Their Sources,' IEEE Internet Computing, pp.20-26, March, 2002
|
13 |
A.C. Snoeren, C. Partridge, L.A. Sanchez, W.T. Strayer, C.E. Jones, F. Tchakountio, and S.T. Kent, 'Hash-Based IP Traceback', BBN Technical Memorandum No. 1284, February 7, 2001
|
14 |
Computer Emergency Response Team, 'TCP SYN flooding and IP Spoofing attackts,' CERT Advisory CA-1996-21, Sept, 1996
|