Towards Stateless Single-Packet IP Traceback
暂无分享,去创建一个
Igor M. Moraes | Pedro B. Velloso | Otto Carlos M. B. Duarte | Daniel de Oliveira Cunha | Marco D. D. Bicudo | Rafael Laufer | Marcelo Duffles Donato Moreira
[1] Steven M. Bellovin,et al. ICMP Traceback Messages , 2003 .
[2] Dawn Xiaodong Song,et al. Advanced and authenticated marking schemes for IP traceback , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[3] Craig Partridge,et al. Single-packet IP traceback , 2002, TNET.
[4] Yin Zhang,et al. Detecting Stepping Stones , 2000, USENIX Security Symposium.
[5] R. Power. CSI/FBI computer crime and security survey , 2001 .
[6] Damien Magoni,et al. Internet topology modeler based on map sampling , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.
[7] M. V. Ramakrishna,et al. Practical performance of Bloom filters and parallel free-text searching , 1989, CACM.
[8] Robert Stone,et al. CenterTrack: An IP Overlay Network for Tracking DoS Floods , 2000, USENIX Security Symposium.
[9] Serge Fdida,et al. Incremental service deployment using the hop-by-hop multicast routing protocol , 2006, TNET.
[10] Jerry R. Hobbs,et al. An algebraic approach to IP traceback , 2002, TSEC.
[11] Haoyu Song,et al. Fast hash table lookup using extended bloom filter: an aid to network processing , 2005, SIGCOMM '05.
[12] Anna R. Karlin,et al. Network support for IP traceback , 2001, TNET.
[13] Bill Cheswick,et al. Tracing Anonymous Packets to Their Approximate Source , 2000, LISA.
[14] George Varghese,et al. Beyond bloom filters: from approximate membership checks to approximate state machines , 2006, SIGCOMM 2006.
[15] Daniel Massey,et al. On design and evaluation of "intention-driven" ICMP traceback , 2001, Proceedings Tenth International Conference on Computer Communications and Networks (Cat. No.01EX495).
[16] Dawn Xiaodong Song,et al. Pi: a path identification mechanism to defend against DDoS attacks , 2003, 2003 Symposium on Security and Privacy, 2003..
[17] Jun Li,et al. Large-scale IP traceback in high-speed Internet: practical techniques and theoretical foundation , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[18] B. Huffaker,et al. Distance Metrics in the Internet , 2002, Anais do 2002 International Telecommunications Symposium.
[19] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.