CenterTrack: An IP Overlay Network for Tracking DoS Floods
暂无分享,去创建一个
[1] Yakov Rekhter,et al. A Border Gateway Protocol 4 (BGP-4) , 1994, RFC.
[2] Ross W. Callon,et al. Use of OSI IS-IS for routing in TCP/IP and dual environments , 1990, RFC.
[3] Anna R. Karlin,et al. Practical network support for IP traceback , 2000, SIGCOMM.
[4] John Moy,et al. OSPF Version 2 , 1998, RFC.
[5] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[6] Bill Cheswick,et al. Tracing Anonymous Packets to Their Approximate Source , 2000, LISA.
[7] Steven M. Bellovin,et al. ICMP Traceback Messages , 2003 .
[8] Stephen T. Kent,et al. Security Architecture for the Internet Protocol , 1998, RFC.
[9] Bassam Halabi,et al. Internet Routing Architectures , 1997 .
[10] C. Huegen. The Latest in Denial of Service Attacks: Smurfing , 1998 .
[11] Christian Huitema,et al. Routing in the Internet , 1995 .
[12] S. M. Bellovin,et al. Security problems in the TCP/IP protocol suite , 1989, CCRV.
[13] Nevil Brownlee,et al. Traffic Flow Measurement: Architecture , 1999, RFC.
[14] Dino Farinacci,et al. Generic Routing Encapsulation (GRE) , 2000, RFC.
[15] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[16] Kimberly C. Claffy,et al. OC3MON: Flexible, Affordable, High Performance Staistics Collection , 1996, LISA.