A deterministic packet marking scheme for tracing multiple Internet attackers
暂无分享,去创建一个
Tsern-Huei Lee | Iven Lin | Tze-Yau William Huang | Tsern-Huei Lee | Tze-Yau William Huang | Iven Lin
[1] Craig Partridge,et al. Single-packet IP traceback , 2002, TNET.
[2] Larry Carter,et al. Universal classes of hash functions (Extended Abstract) , 1977, STOC '77.
[3] Nirwan Ansari,et al. Tracing multiple attackers with deterministic packet marking (DPM) , 2003, 2003 IEEE Pacific Rim Conference on Communications Computers and Signal Processing (PACRIM 2003) (Cat. No.03CH37490).
[4] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[5] Daniel Massey,et al. On design and evaluation of "intention-driven" ICMP traceback , 2001, Proceedings Tenth International Conference on Computer Communications and Networks (Cat. No.01EX495).
[6] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[7] Craig Partridge,et al. Hash-based IP traceback , 2001, SIGCOMM.
[8] Steven M. Bellovin,et al. ICMP Traceback Messages , 2003 .
[9] Dawn Xiaodong Song,et al. Advanced and authenticated marking schemes for IP traceback , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[10] Bill Cheswick,et al. Tracing Anonymous Packets to Their Approximate Source , 2000, LISA.
[11] Nirwan Ansari,et al. IP traceback with deterministic packet marking , 2003, IEEE Communications Letters.
[12] Anna R. Karlin,et al. Network support for IP traceback , 2001, TNET.