1 |
Wang, Haining, Cheng Jin, and Kang G. Shin. "Defense against spoofed IP traffic using hop-count filtering," IEEE/ACM Transactions on Networking, pp. 40-53, Sep. 2007.
|
2 |
Korea Internet & Security Agency, "Study on the Method of a spoofed IP detection about the DDoS attack," 2013.
|
3 |
K.Park, H.Lee, "On the Effectiveness of Probabilistic Packet Marking for IP Traceback under Denial of Service Attack," Department of Computer Sciences, Purdue University, 2000.
|
4 |
D.Song, A. Perrig, "Advanced and Authenticated Marking Schemes for IP Traceback," IEEE INFO COM 2001, 2001.
|
5 |
M. Adler, "Tradeoffs in Probabilistic Packet Marking for IP Traceback," Department of Computer Science, University of Masachusetts, 2001.
|
6 |
G. S. Savage, D. Wetherall, A. Karlin, and T. Anderson, "Network support for IP traceback," IEEE/ACM Trans. Networking, vol.9, pp. 226-237, June 2001.
DOI
|
7 |
T. Peng, C. Leckie, and K. Ramamo hanarao, "Adjusted probabilistic packet marking for IP traceback," in Proc. Networking, May 2002, pp. 697- 708, 2002.
|
8 |
M. Adler, "Tradeoffs in probabilistic packet marking for IP traceback," Proc. 34th ACM Symp. Theory of Computing (STOC), pp. 407-418, May 2002.
|
9 |
S. S. Rana and T. M. Bansod, "IP Spoofing Attack Detection using Route Based Information," in International Journal of Advanced Research in Computer Engineering & Technology, ISSN: 2278-1323, Volume 1, Issue 4, June 2012.
|