An incrementally deployable path address scheme
暂无分享,去创建一个
[1] Steven M. Bellovin,et al. ICMP Traceback Messages , 2003 .
[2] Anna R. Karlin,et al. Practical network support for IP traceback , 2000, SIGCOMM.
[3] Ratul Mahajan,et al. Controlling high bandwidth aggregates in the network , 2002, CCRV.
[4] Dawn Xiaodong Song,et al. FIT: fast Internet traceback , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[5] Ari Juels,et al. $evwu Dfw , 1998 .
[6] Wanlei Zhou,et al. Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics , 2011, IEEE Transactions on Information Forensics and Security.
[7] Dawn Xiaodong Song,et al. StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense , 2006, IEEE Journal on Selected Areas in Communications.
[8] Otto Carlos Muniz Bandeira Duarte,et al. A Stateless Traceback Technique for Identifying the Origin of Attacks from a Single Packet , 2011, 2011 IEEE International Conference on Communications (ICC).
[9] Michael K. Reiter,et al. Defending against denial-of-service attacks with puzzle auctions , 2003, 2003 Symposium on Security and Privacy, 2003..
[10] Ramesh Govindan,et al. BGP Route Flap Damping , 1998, RFC.
[11] Ehab Al-Shaer,et al. Adaptive Early Packet Filtering for Defending Firewalls Against DoS Attacks , 2009, IEEE INFOCOM 2009.
[12] Laurent Toutain,et al. Solving the Ingress Filtering Issue in an IPv6 Multihomed Home Network , 2010, 2010 Ninth International Conference on Networks.
[13] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[14] Wanlei Zhou,et al. Traceback of DDoS Attacks Using Entropy Variations , 2011, IEEE Transactions on Parallel and Distributed Systems.
[15] Dawn Xiaodong Song,et al. Pi: a path identification mechanism to defend against DDoS attacks , 2003, 2003 Symposium on Security and Privacy, 2003..
[16] Amir Herzberg,et al. QoSoDoS: If you can't beat them, join them! , 2011, 2011 Proceedings IEEE INFOCOM.
[17] Alex C. Snoeren,et al. Hash-based IP traceback , 2001, SIGCOMM '01.
[18] Anat Bremler-Barr,et al. Spoofing prevention method , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[19] Kang G. Shin,et al. SYN-dog: sniffing SYN flooding sources , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[20] Craig Partridge,et al. Hash-based IP traceback , 2001, SIGCOMM.
[21] Angelos D. Keromytis,et al. SOS: secure overlay services , 2002, SIGCOMM '02.
[22] Angelos D. Keromytis,et al. Using graphic turing tests to counter automated DDoS attacks against web servers , 2003, CCS '03.
[23] Unrecognized. BGP Stability Improvements , 2007 .
[24] David G. Andersen,et al. Proceedings of Usits '03: 4th Usenix Symposium on Internet Technologies and Systems Mayday: Distributed Filtering for Internet Services , 2022 .
[25] Jelena Mirkovic,et al. Comparative Evaluation of Spoofing Defenses , 2011, IEEE Transactions on Dependable and Secure Computing.
[26] Yakov Rekhter,et al. A Border Gateway Protocol 4 (BGP-4) , 1994, RFC.
[27] Heejo Lee,et al. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets , 2001, SIGCOMM '01.
[28] Michalis Faloutsos,et al. On power-law relationships of the Internet topology , 1999, SIGCOMM '99.