A new border filtering scheme against DDoS attacks
暂无分享,去创建一个
[1] Guang Jin,et al. Deterministic packet marking based on redundant decomposition for IP traceback , 2006, IEEE Communications Letters.
[2] Dawn Xiaodong Song,et al. Pi: a path identification mechanism to defend against DDoS attacks , 2003, 2003 Symposium on Security and Privacy, 2003..
[3] Dawn Xiaodong Song,et al. StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense , 2006, IEEE Journal on Selected Areas in Communications.
[4] Nirwan Ansari,et al. IP traceback with deterministic packet marking , 2003, IEEE Communications Letters.
[5] Shiuh-Pyng Shieh,et al. Defending against spoofed DDoS attacks with path fingerprint , 2005, Comput. Secur..
[6] Francis L. Merat,et al. Defeating distributed denial-of-service attack with deterministic bit marking , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[7] Lee Garber,et al. Denial-of-Service Attacks Rip the Internet , 2000, Computer.
[8] Anna R. Karlin,et al. Practical network support for IP traceback , 2000, SIGCOMM.
[9] Yuan Li,et al. A Pi2HC mechanism against DDoS attacks , 2008, 2008 Third International Conference on Communications and Networking in China.