Detecting SYN Flooding Agents under Any Type of IP Spoofing
暂无分享,去创建一个
[1] Christine E. Jones,et al. Hash-based IP traceback , 2001, SIGCOMM '01.
[2] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.
[3] Kang G. Shin,et al. SYN-dog: sniffing SYN flooding sources , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[4] Michèle Basseville,et al. Detection of abrupt changes: theory and application , 1993 .
[5] G. Manimaran,et al. Intentional Dropping: A Novel Scheme for SYN Flooding Mitigation , 2005, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[6] Bin Liu,et al. A Novel Router-based Scheme to Mitigate SYN Flooding DDoS Attacks , 2007 .
[7] Li Fan,et al. Summary cache: a scalable wide-area web cache sharing protocol , 2000, TNET.
[8] C. F. Chong,et al. IDR: an intrusion detection router for defending against distributed denial-of-service (DDoS) attacks , 2004, 7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings..
[9] Vern Paxson,et al. Computing TCP's Retransmission Timer , 2000, RFC.
[10] G. Manimaran,et al. Internet infrastructure security: a taxonomy , 2002, IEEE Netw..
[11] Christopher Leckie,et al. An efficient filter for denial-of-service bandwidth attacks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[12] Wei Chen,et al. Defending Against TCP SYN Flooding Attacks Under Different Types of IP Spoofing , 2006, International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06).