A two-level source address spoofing prevention based on automatic signature and verification mechanism
暂无分享,去创建一个
Qiang Liu | Jianping Wu | Jun Bi | Yan Shen | Qiang Liu | Jianping Wu | J. Bi | Yan Shen
[1] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[2] Markus Jakobsson,et al. Efficient Constructions for One-Way Hash Chains , 2005, ACNS.
[3] Anat Bremler-Barr,et al. Spoofing prevention method , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[4] Micah Adler,et al. Trade-offs in probabilistic packet marking for IP traceback , 2005, JACM.
[5] Li Fan,et al. Summary cache: a scalable wide-area web cache sharing protocol , 2000, TNET.
[6] Nirwan Ansari,et al. On IP traceback , 2003, IEEE Commun. Mag..
[7] Kang G. Shin,et al. Hop-count filtering: an effective defense against spoofed DDoS traffic , 2003, CCS '03.
[8] Steven M. Bellovin,et al. ICMP Traceback Messages , 2003 .
[9] Dawn Xiaodong Song,et al. Advanced and authenticated marking schemes for IP traceback , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[10] Micah Adler. Tradeoffs in probabilistic packet marking for IP traceback , 2002, STOC '02.
[11] Craig Partridge,et al. Single-packet IP traceback , 2002, TNET.
[12] Heejo Lee,et al. On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[13] Jianping Wu,et al. An Authentication Based Source Address Spoofing Prevention Method Deployed in IPv6 Edge Network , 2007, International Conference on Computational Science.
[14] Takuji Nishimura,et al. Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator , 1998, TOMC.
[15] Stefan Savage,et al. Inferring Internet denial-of-service activity , 2001, TOCS.
[16] W.T. Strayer,et al. SPIE-IPv6: single IPv6 packet traceback , 2004, 29th Annual IEEE International Conference on Local Computer Networks.
[17] Fred Piper,et al. Stream Ciphers , 1982, EUROCRYPT.
[18] Xin Liu,et al. Efficient and Secure Source Authentication with Packet Passports , 2006, SRUTI.
[19] M. Baptista. Cryptography with chaos , 1998 .