1 |
Arena Simulation Software, https://www.arenasimulation.com/.
|
2 |
Belenky, A. and Ansari, N., “IP traceback with deterministic packet marking,” IEEE communications letters, Vol. 7, No. 4, pp. 162-164, 2003.
DOI
|
3 |
DARPA 1999 Intrusion Detection Data Sets, https://ll.mit.edu/ideval/data/.
|
4 |
Foroushani, V. A. and Zincir-Heywood, A. N., "Deterministic and authenticated flow marking for IP traceback," Advanced Information Networking and Applications (AINA), 2013 IEEE 27th International Conference on. IEEE, 2013.
|
5 |
Incident Response Team and Incident countermeasure planning team of Financial Security Institute, "Effective response to the financial crisis," 2015.
|
6 |
Kuhl et al., "Cyber attack modeling and simulation for network security analysis," Proceedings of the 39th Conference on Winter Simulation: 40 years! The best is yet to come, IEEE Press, 2007.
|
7 |
Song, D. X. and Perrig, A., "Advanced and authenticated marking schemes for IP traceback," INFOCOM 2001, Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies, Proceedings, IEEE, Vol. 2, pp. 878-886, 2001.
|
8 |
Park, E. Y. and Yoon, J. W., “A study of accident prevention effect through anomaly analysis in E-banking,” The Journal of Society for e-Business Studies, Vol. 19, No. 4, pp. 119-134, 2014.
DOI
|
9 |
Savage, S., Wetherall, D., Karlin, a., and Anderson, T., “Network support for IP traceback,” IEEE/ACM Transaction on Networking, Vol. 9, No. 3, pp. 226-237, 2001.
DOI
|
10 |
Savage, S., Wetherall, D., Karlin, a., and Anderson, T., “Practical network support for IP traceback,” ACM SIGCOMM Computer Communication Review, Vol. 30, No. 4, pp. 295-306, 2000.
DOI
|