Distributed packet pairing for reflector based DDoS attack mitigation
暂无分享,去创建一个
[1] Jun Li,et al. SAVE: source address validity enforcement protocol , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[2] Ratul Mahajan,et al. Measuring ISP topologies with rocketfuel , 2002, SIGCOMM 2002.
[3] Jerry R. Hobbs,et al. An algebraic approach to IP traceback , 2002, TSEC.
[4] Larry L. Peterson,et al. Defending against denial of service attacks in Scout , 1999, OSDI '99.
[5] S. Ross. A First Course in Probability , 1977 .
[6] Michael T. Goodrich,et al. Efficient packet marking for large-scale IP traceback , 2002, CCS '02.
[7] Anna R. Karlin,et al. Practical network support for IP traceback , 2000, SIGCOMM.
[8] Heejo Lee,et al. On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[9] Kang G. Shin,et al. Hop-count filtering: an effective defense against spoofed DDoS traffic , 2003, CCS '03.
[10] David K. Y. Yau,et al. Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles , 2002, IEEE 2002 Tenth IEEE International Workshop on Quality of Service (Cat. No.02EX564).
[11] Kotagiri Ramamohanarao,et al. Detecting reflector attacks by sharing beliefs , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[12] Vern Paxson,et al. End-to-end routing behavior in the Internet , 1996, TNET.
[13] Tzi-cker Chiueh,et al. A path information caching and aggregation approach to traffic source identification , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..
[14] Anna R. Karlin,et al. Practical network support for IP traceback , 2000, SIGCOMM.
[15] Matt Ganis,et al. SOCKS Protocol Version 5 , 1996, RFC.
[16] G. Manimaran,et al. A novel packet marking scheme for IP traceback , 2004, Proceedings. Tenth International Conference on Parallel and Distributed Systems, 2004. ICPADS 2004..
[17] Jelena Mirkovic,et al. Attacking DDoS at the source , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[18] Catherine A. Meadows,et al. A formal framework and evaluation method for network denial of service , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.
[19] Bill Cheswick,et al. Tracing Anonymous Packets to Their Approximate Source , 2000, LISA.
[20] Marco Mellia,et al. TCP model for short lived flows , 2002, IEEE Communications Letters.
[21] Brian Krebs,et al. Attack On Internet Called Largest Ever , 2002 .
[22] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[23] J. Postel,et al. File transfer protocol (FTP) , 1985 .
[24] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[25] Vern Paxson,et al. An analysis of using reflectors for distributed denial-of-service attacks , 2001, CCRV.
[26] Craig Partridge,et al. Hash-based IP traceback , 2001, SIGCOMM.
[27] John S. Heidemann,et al. A framework for classifying denial of service attacks , 2003, SIGCOMM '03.
[28] Kang G. Shin,et al. Transport-Aware IP Routers: A Built-In Protection Mechanism to Counter DDoS Attacks , 2003, IEEE Trans. Parallel Distributed Syst..
[29] Kevin J. Houle,et al. Trends in Denial of Service Attack Technology , 2001 .
[30] Kang G. Shin,et al. Detecting SYN flooding attacks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.