Reviewing Technological Solutions of Source Address Validation

[1]  Arun Kumar Sangaiah,et al.  Towards a SDN-Based Integrated Architecture for Mitigating IP Spoofing Attack , 2018, IEEE Access.

[2]  Paramvir Singh,et al.  A systematic review of IP traceback schemes for denial of service attacks , 2016, Comput. Secur..

[3]  Jianping Wu,et al.  Source Address Validation Improvement (SAVI) Solution for DHCP , 2015, RFC.

[4]  Hu Jinlong,et al.  Source address validation based Ethernet switches for IPv6 network , 2012, 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE).

[5]  Junyun Wu,et al.  SAVI-based IPv6 source address validation implementation of the access network , 2011, 2011 International Conference on Computer Science and Service System (CSSS).

[6]  Xudong Wang,et al.  Routing in trustworthy networks with SAVA nodes , 2010, 2010 2nd International Conference on Advanced Computer Control.

[7]  Jun Bi,et al.  An IPv6 Test-Bed Implementation for a Future Source Address Validation Architecture , 2008, 2008 Next Generation Internet Networks.

[8]  Gang Ren,et al.  Source Address Validation: Architecture and Protocol Design , 2007, 2007 IEEE International Conference on Network Protocols.

[9]  Kartik Gopalan,et al.  DMTP: Controlling spam through message delivery differentiation , 2006, Comput. Networks.

[10]  W.T. Strayer,et al.  SPIE-IPv6: single IPv6 packet traceback , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[11]  Christine E. Jones,et al.  Hash-based IP traceback , 2001, SIGCOMM '01.

[12]  Robert Stone,et al.  CenterTrack: An IP Overlay Network for Tracking DoS Floods , 2000, USENIX Security Symposium.