On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets
暂无分享,去创建一个
[1] Catherine A. Meadows,et al. A formal framework and evaluation method for network denial of service , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.
[2] Roger M. Needham,et al. Denial of service , 1993, CCS '93.
[3] Peter Druschel,et al. Resource containers: a new facility for resource management in server systems , 1999, OSDI '99.
[4] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[5] Heejo Lee,et al. On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[6] Bill Cheswick,et al. Tracing Anonymous Packets to Their Approximate Source , 2000, LISA.
[7] Ramesh Govindan,et al. An analysis of Internet inter-domain topology and route stability , 1997, Proceedings of INFOCOM '97.
[8] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[9] Elizabeth D. Zwicky,et al. Building internet firewalls , 1995 .
[10] Markus G. Kuhn,et al. Analysis of a denial of service attack on TCP , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[11] Lee Garber,et al. Denial-of-Service Attacks Rip the Internet , 2000, Computer.
[12] Jean-Jacques Pansiot,et al. On routes and multicast trees in the Internet , 1998, CCRV.
[13] Robert Morris. A Weakness in the 4.2BSD Unix† TCP/IP Software , 1999 .
[14] Elizabeth D. Zwicky,et al. Building Internet firewalls (2nd ed.) , 2000 .
[15] Jon Postel,et al. Internet Protocol , 1981, RFC.
[16] Michalis Faloutsos,et al. On power-law relationships of the Internet topology , 1999, SIGCOMM '99.
[17] Steven M. Bellovin,et al. ICMP Traceback Messages , 2003 .
[18] Dawn Xiaodong Song,et al. Advanced and authenticated marking schemes for IP traceback , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[19] Larry L. Peterson,et al. Defending against denial of service attacks in Scout , 1999, OSDI '99.
[20] BERNARD M. WAXMAN,et al. Routing of multipoint connections , 1988, IEEE J. Sel. Areas Commun..
[21] Anna R. Karlin,et al. Practical network support for IP traceback , 2000, SIGCOMM.
[22] John D. Howard,et al. An analysis of security incidents on the Internet 1989-1995 , 1998 .
[23] Kenneth Steiglitz,et al. Combinatorial Optimization: Algorithms and Complexity , 1981 .
[24] Ibrahim Matta,et al. BRITE: A Flexible Generator of Internet Topologies , 2000 .