Tài liệu tham khảo |
Loại |
Chi tiết |
[1] S. Savage et al., “Network Support for IP Traceback,” IEEE/ACM Trans. Networking, vol. 9, no. 3, 2001, pp. 226–237 |
Sách, tạp chí |
Tiêu đề: |
Network Support for IP Traceback |
Tác giả: |
S. Savage, et al |
Nhà XB: |
IEEE/ACM Trans. Networking |
Năm: |
2001 |
|
[3] Tao Peng, Christopher Leckie, and Kotagiri Ramamohanarao. Adjusted probabilistic packet marking for ip traceback. In Proceedings of Networking 2002, Pisa, Italy, May 2002 |
Sách, tạp chí |
Tiêu đề: |
Adjusted probabilistic packet marking for ip traceback |
Tác giả: |
Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao |
Nhà XB: |
Proceedings of Networking 2002 |
Năm: |
2002 |
|
[4] A.C. Snoeren et al., “Single-Packet IP Traceback,” IEEE/ACM Trans. Networking, vol. 10, no. 6, 2002, pp. 721–734 |
Sách, tạp chí |
Tiêu đề: |
Single-Packet IP Traceback,” "IEEE/ACM Trans. Networking |
|
[5] T. Baba and S. Matsuda, “Tracing Network Attacks to Their Sources,” IEEE Internet Computing, vol. 6, no. 3, 2002, pp. 20–26 |
Sách, tạp chí |
Tiêu đề: |
Tracing Network Attacks to Their Sources |
Tác giả: |
T. Baba, S. Matsuda |
Nhà XB: |
IEEE Internet Computing |
Năm: |
2002 |
|
[6] S.C. Lee and C. Shields, “Tracing the Source of Network Attack: A Technical, Legal and Societal Problem,” Proc.2001 IEEE Workshop on Information Assurance and Security, IEEE Press, 2001, pp. 239–246 |
Sách, tạp chí |
Tiêu đề: |
Tracing the Source of Network Attack: A Technical, Legal and Societal Problem,” "Proc.2001 IEEE Workshop on Information Assurance and Security |
|
[7] S. Bellovin, M. Leech, and T. Taylor, “ICMP Traceback Messages,” Internet Draft, Internet Eng. Task Force, 2003; work in progress |
Sách, tạp chí |
Tiêu đề: |
ICMP Traceback Messages |
|
[8] A. Mankin et al., “On Design and Evaluation of ‘Intention-Driven’ ICMP Traceback,” Proc. IEEE Int’l Conf. Computer Comm. and Networks, IEEE CS Press, 2001. pp.159–165 |
Sách, tạp chí |
Tiêu đề: |
On Design and Evaluation of ‘Intention-Driven’ ICMP Traceback,” "Proc. IEEE Int’l Conf. Computer Comm. and Networks |
|
[9] W. Lee and K. Park, “On the Effectiveness of Probabilistic Packet Marking for IP Traceback under Denial of Service Attack,” Proc. IEEE INFOCOM, IEEE CS Press, 2001, pp. 338–347 |
Sách, tạp chí |
Tiêu đề: |
On the Effectiveness of Probabilistic Packet Marking for IP Traceback under Denial of Service Attack,” "Proc. IEEE INFOCOM |
|
[11] M. Adler, “Tradeoffs in Probabilistic Packet Marking for IP Traceback,” Proc. 34th ACM Symp. Theory of Computing, ACM Press, 2002, pp. 407–418 |
Sách, tạp chí |
Tiêu đề: |
Tradeoffs in Probabilistic Packet Marking for IP Traceback,” "Proc. 34th ACM Symp. Theory of Computing |
|
[12] M. Waldvogel, “GOSSIB vs. IP Traceback Rumors,” Proc. 18th Ann. Computer Security Applications Conf. (ACSAC 2002), 2002, pp. 5–13 |
Sách, tạp chí |
Tiêu đề: |
GOSSIB vs. IP Traceback Rumors |
Tác giả: |
M. Waldvogel |
Nhà XB: |
Proc. 18th Ann. Computer Security Applications Conf. (ACSAC 2002) |
Năm: |
2002 |
|
[13] D. Dean, M. Franklin, and A. Stubblefield, “An Algebraic Approach to IP Traceback,” ACM Trans. Information and System Security, vol. 5, no. 2, 2002, pp.119–137 |
Sách, tạp chí |
Tiêu đề: |
An Algebraic Approach to IP Traceback |
Tác giả: |
D. Dean, M. Franklin, A. Stubblefield |
Nhà XB: |
ACM Trans. Information and System Security |
Năm: |
2002 |
|
[14] M. Goodrich, “Efficient Packet Marking for Large-Scale IP Traceback,” Proc. 9th ACM Conf. Computer and Communication Security, ACM Press, 2002, pp. 117–126 |
Sách, tạp chí |
Tiêu đề: |
Efficient Packet Marking for Large-Scale IP Traceback,” "Proc. 9th ACM Conf. Computer and Communication Security |
|
[15] H. Aljifri, M. Smets, and A. Pons, “IP Traceback Using Header Compression,” Computers & Security, vol. 22, no. 2, 2003, pp. 136–151 |
Sách, tạp chí |
Tiêu đề: |
IP Traceback Using Header Compression,” "Computers & Security |
|
[16] Characterizing and Tracing Packet Floods Using Cisco Router,Cisco Systems, 1999; www.cisco.com/warp/public/707/22.html |
Sách, tạp chí |
Tiêu đề: |
Characterizing and Tracing Packet Floods Using Cisco Router |
|
[17] R. Stone, “CenterTrack: An IP Overlay Network for Tracking DoS Floods,” Proc. 9th Usenix Security Symp., Usenix Assoc., 2000, pp. 199–212 |
Sách, tạp chí |
Tiêu đề: |
CenterTrack: An IP Overlay Network for Tracking DoS Floods,” "Proc. "9th Usenix Security Symp |
|
[18] H. Burch and B. Cheswick, “Tracing Anonymous Packets to Their Approximate Source,” Proc. 14th Conf. Systems Administration, Usenix Assoc., 2000, pp. 313–322 |
Sách, tạp chí |
Tiêu đề: |
Tracing Anonymous Packets to Their Approximate Source,” "Proc. 14th Conf. Systems Administration |
|
[10] Internet Mapping Project. http://research.lumeta.com/ches/map/ Accessed October, 2006 |
Link |
|
[2] Song, D., and Perrig, A. Advanced and Authenticated Marking Schemes for IP Traceback. Proc. of IEEE INFOCOM, Vol. 2, April 2001, pp. 878-886 |
Khác |
|
[19] Aljifri, H. IP Traceback: A New Denial-of-Service Deterrent? IEEE Security and Privacy, Vol. 1(3), 2003, pp. 24-31 |
Khác |
|