Investigating unique flow marking for tracing back DDoS attacks
暂无分享,去创建一个
[1] A. Nur Zincir-Heywood,et al. IP traceback through (authenticated) deterministic flow marking: an empirical evaluation , 2013, EURASIP Journal on Information Security.
[2] Craig Partridge,et al. Single-packet IP traceback , 2002, TNET.
[3] Nirwan Ansari,et al. On IP traceback , 2003, IEEE Commun. Mag..
[4] Dawn Xiaodong Song,et al. FIT: fast Internet traceback , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[5] A. Nur Zincir-Heywood,et al. On Evaluating IP Traceback Schemes: A Practical Perspective , 2013, 2013 IEEE Security and Privacy Workshops.
[6] A. Nur Zincir-Heywood,et al. TDFA: Traceback-Based Defense against DDoS Flooding Attacks , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.
[7] Nirwan Ansari,et al. On deterministic packet marking , 2007, Comput. Networks.
[8] S. Mercy Shalinie,et al. Attack source identification at router level in real time using marking algorithm deployed in programmable routers , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).
[9] M. Tech,et al. RIHT: A Novel Hybrid IP Traceback Scheme , 2014 .
[10] Anna R. Karlin,et al. Network support for IP traceback , 2001, TNET.
[11] A. Nur Zincir-Heywood,et al. Deterministic and Authenticated Flow Marking for IP Traceback , 2013, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA).