Dynamic probabilistic packet marking for efficient IP traceback
暂无分享,去创建一个
[1] Jun Li,et al. SAVE: source address validity enforcement protocol , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[2] Craig Partridge,et al. Single-packet IP traceback , 2002, TNET.
[3] Heejo Lee,et al. On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[4] Steven M. Bellovin,et al. ICMP Traceback Messages , 2003 .
[5] Dawn Xiaodong Song,et al. Advanced and authenticated marking schemes for IP traceback , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[6] Larry L. Peterson,et al. Defending against denial of service attacks in Scout , 1999, OSDI '99.
[7] Heejo Lee,et al. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets , 2001, SIGCOMM '01.
[8] Mark Crovella,et al. Server selection using dynamic path characterization in wide-area networks , 1997, Proceedings of INFOCOM '97.
[9] Peter Druschel,et al. Resource containers: a new facility for resource management in server systems , 1999, OSDI '99.
[10] Anna R. Karlin,et al. Practical network support for IP traceback , 2000, SIGCOMM.
[11] Kurt Rothermel,et al. Dynamic distance maps of the Internet , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[12] Philip N. Klein,et al. Using router stamping to identify the source of IP packets , 2000, CCS.
[13] Kotagiri Ramamohanarao,et al. Adjusted Probabilistic Packet Marking for IP Traceback , 2002, NETWORKING.
[14] Lee Garber,et al. Denial-of-Service Attacks Rip the Internet , 2000, Computer.
[15] Anna R. Karlin,et al. Network support for IP traceback , 2001, TNET.
[16] Stephen E. Deering,et al. Internet Protocol, Version 6 (IPv6) Specification , 1995, RFC.
[17] Bill Cheswick,et al. Tracing Anonymous Packets to Their Approximate Source , 2000, LISA.
[18] Kang G. Shin,et al. Hop-Count Filtering : An Effective Defense Against Spoofed Traffic , 2003 .
[19] Stefan Savage,et al. Inferring Internet denial-of-service activity , 2001, TOCS.
[20] Jon Postel,et al. Internet Protocol , 1981, RFC.
[21] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[22] Larry L. Peterson,et al. Scout: a communications-oriented operating system , 1995, Proceedings 5th Workshop on Hot Topics in Operating Systems (HotOS-V).
[23] Kang G. Shin,et al. Hop-count filtering: an effective defense against spoofed DDoS traffic , 2003, CCS '03.
[24] Dawn Xiaodong Song,et al. Pi: a path identification mechanism to defend against DDoS attacks , 2003, 2003 Symposium on Security and Privacy, 2003..
[25] Aikaterini Mitrokotsa,et al. DDoS attacks and defense mechanisms: classification and state-of-the-art , 2004, Comput. Networks.