Defending Denial of Service: State Overload Attacks
暂无分享,去创建一个
[1] Kevin C. Almeroth,et al. The evolution of multicast: from the MBone to interdomain multicast to Internet2 deployment , 2000, IEEE Netw..
[2] Anna R. Karlin,et al. Practical network support for IP traceback , 2000, SIGCOMM.
[3] Mark Handley,et al. Steps towards a DoS-resistant internet architecture , 2004, FDNA '04.
[4] David Meyer,et al. Network Working Group Protocol Independent Multicast -sparse Mode (pim-sm) Multicast Routing Security Issues and Enhancements 3.2.1. Sending Multicast to Empty Groups (data Flooding) ...7 3.2.2. Disturbing Existing Group by Sending to It , 2022 .
[5] David Thaler,et al. Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification , 1997, RFC.
[6] Balachander Krishnamurthy,et al. On the use and performance of content distribution networks , 2001, IMW '01.
[7] Kamil Saraç,et al. Defending Network-Based Services Against Denial of Service Attacks , 2006, Proceedings of 15th International Conference on Computer Communications and Networks.
[8] Scott Shenker,et al. General Characterization Parameters for Integrated Service Network Elements , 1997, RFC.
[9] Christophe Diot,et al. Deployment issues for the IP multicast service and architecture , 2000, IEEE Netw..