Two-Phase Traceback of DDoS Attacks with Overlay Network
暂无分享,去创建一个
[1] Minyi Guo,et al. Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks , 2009, IEEE Transactions on Parallel and Distributed Systems.
[2] Dawn Xiaodong Song,et al. Advanced and authenticated marking schemes for IP traceback , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[3] Anna R. Karlin,et al. Network support for IP traceback , 2001, TNET.
[4] Nirwan Ansari,et al. IP traceback with deterministic packet marking , 2003, IEEE Communications Letters.
[5] Tsern-Huei Lee,et al. A deterministic packet marking scheme for tracing multiple Internet attackers , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[6] M.T. Goodrich,et al. Probabilistic Packet Marking for Large-Scale IP Traceback , 2008, IEEE/ACM Transactions on Networking.