Tracing Network Attacks to Their Sources
暂无分享,去创建一个
[1] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[2] Anna R. Karlin,et al. Network support for IP traceback , 2001, TNET.
[3] Steven M. Bellovin,et al. ICMP Traceback Messages , 2003 .
[4] M. Asaka,et al. A method of tracing intruders by use of mobile agents , 1999 .
[5] Anna R. Karlin,et al. Practical network support for IP traceback , 2000, SIGCOMM.
[6] Robert Stone,et al. CenterTrack: An IP Overlay Network for Tracking DoS Floods , 2000, USENIX Security Symposium.
[7] Shyhtsun Felix Wu,et al. DECIDUOUS: decentralized source identification for network-based intrusions , 1999, Integrated Network Management VI. Distributed Management for the Networked Millennium. Proceedings of the Sixth IFIP/IEEE International Symposium on Integrated Network Management. (Cat. No.99EX302).