A source identification scheme against DDoS attacks in cluster interconnects
暂无分享,去创建一个
[1] Andrew A. Chien,et al. Breaking the barriers: high performance security for high performance computing , 2002, NSPW '02.
[2] Kevin J. Houle,et al. Trends in Denial of Service Attack Technology , 2001 .
[3] Dawn Xiaodong Song,et al. Advanced and authenticated marking schemes for IP traceback , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[4] Bill Cheswick,et al. Tracing Anonymous Packets to Their Approximate Source , 2000, LISA.
[5] Robert Stone,et al. A Snapshot of Global Internet Worm Activity , 2001 .
[6] Anna R. Karlin,et al. Practical network support for IP traceback , 2000, SIGCOMM.
[7] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[8] Steven Tuecke,et al. Managing security in high‐performance distributed computations , 1998, Cluster Computing.
[9] Dawn Xiaodong Song,et al. Pi: a path identification mechanism to defend against DDoS attacks , 2003, 2003 Symposium on Security and Privacy, 2003..
[10] Rossen Dimitrov,et al. Challenges and New Technologies for Addressing Security in High Performance Distributed Environments , 1998 .