Survey of Traceback Methods
暂无分享,去创建一个
[1] Kamil Saraç,et al. Single packet IP traceback in AS-level partial deployment scenario , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[2] A. M. Natarajan,et al. A New Promising IP Traceback Approach and its Comparison with Existing Approaches , 2007 .
[3] Emmanuel S. Pilli,et al. IPv6 Packet Traceback: A Survey , 2013 .
[4] Daniel Massey,et al. On design and evaluation of "intention-driven" ICMP traceback , 2001, Proceedings Tenth International Conference on Computer Communications and Networks (Cat. No.01EX495).
[5] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[6] Anna R. Karlin,et al. Network support for IP traceback , 2001, TNET.
[7] A. Nur Zincir-Heywood,et al. IP traceback through (authenticated) deterministic flow marking: an empirical evaluation , 2013, EURASIP Journal on Information Security.
[8] Nirwan Ansari,et al. On deterministic packet marking , 2007, Comput. Networks.
[9] Nirwan Ansari,et al. IP traceback with deterministic packet marking , 2003, IEEE Communications Letters.
[10] Ashwani Parashar,et al. Improved deterministic packet marking algorithm , 2013, 2013 15th International Conference on Advanced Computing Technologies (ICACT).