1. Computer Emergency Response Team. Cert advisory ca-2000-01: denial-of-service developments. [2007-02-01]. http://www.cert.org/advisories/ CA-2000-01.html
2. Belenky A, Ansari N. On IP traceback. IEEE Communications Magazine, 2003, 41(7): 142–153
3. Savage S, Wetherall D, Karlin A, et al. Practical network support for IP traceback. Computer Communication Review, 2000, 30(4): 295–306
4. Dawn X S, Perrig A. Advanced and authenticated marking schemes for IP traceback. Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies, Apr 22–26 2001, Anchorage, AK, USA. Piscataway, NJ, USA: IEEE, 2001: 878–886
5. Yaar A, Perriq A, Sonq D. Pi: a path identification mechanism to defend against DDoS attacks. Proceedings of Symposium on Security and Privacy, May 11–14, 2003, Berkeley, CA, USA. Piscataway, NJ, USA: IEEE. 2003: 93–107
6. Park K, Lee H. On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack. Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies, Apr 22–26, 2001, Anchorage, AK, USA. Piscataway, NJ, USA: IEEE, 2001: 338–3347
7. Tchakountio F, Kent S T, Strayer W T. Hash-based IP traceback. Proceedings of Conference on Applications, Technologies, Architectures, and Protocol for Computer Communication (SIGCOMM’01), Aug 27–31, 2001. San Diego, CA, USA. New York, NY, USA: ACM, 2001: 3–14
9. Chang R K C. Defending against flooding-based distributed denial-of-service attacks: a tutorial. IEEE Communications Magazine, 2002, 40(10): 42–51 |