References
[1]. Computer Emergency Response Team, “CERT
Advisory CA-98.01 : Smurf IP Denial—of—Service Attack via
pings,” hitp://wvvw. cert. org/advisories/CA—98. 04 . Smurf.
html.
[2]. Computer Emergency Response Team, “CERT
Advisory CA—92.2i: TCP SYN Flooding and IP Spoofing
Attacks," ni'ip://wvvvv. cert. org/advisories/CA—9é. 2 4. ping.
htmi.
[3]. R Ferguson and D. Seneie, Network ingress Filtering
Defeating Denial of Service Attacks which employ IP
sourceAddress spoofing, RFC 22-67, January 1 998.
[4]. H. Burch and B. Cheswick, “Tracing Anonymous
Packets to their Approximate Source,” Proc. USEN/X LISA,
2000, pp. 31 9-327.
[5]. S. M. Bellovin, “lCMP Traceback Messages," IETF draft,
2000;http.'//www. research. att. com/smb
/papers/draftbeI/ ovin—itrace-00. txt.
[6]. R. Stone, “Centertrack: An IP Overlay Network for
Tracking DoS Floods," Proc. 9th USENIX Sec. Symp., 2000,
pp. 199-212.
[7]. Drew Dean, Matt Franklin and Adam Stubbledield,
“An Algebraic Approach to IP traceback", In proceedings
ofNDSS'01, February 2001 .
[8]. D.X. Song and A. Perrig, “Advanced and
Authenticated Marking Schemes for IP Traceback," Proc.
INFOCOM, 2001 ,vol. 2, pp. 878-886.
[9]. Kihong Park, Heejo Lee, "On the Effectiveness ofProbabilistic Packet Marking for IP Traceback under Denial
of Service Attack," IEEE INFOCOM 2001 .
[10]. S. Savage, David Wetherall, Anna Karlin and Tom
Anderson, “Practical Network Support for IP traceback,”
/EEE/ACM Transaction, Network, Vol.9 no. 3 June 2001,
PP 226-237.
[11]. Allison Mankin, Dan Massey, Chie Lung Wu, 3. Felix
Wu, Lixia Zhang, “On Design and Evaluation of Intention-
Driven ICMP Traceback,” 10th International Conference
on Computer Communications and Networks
(|C3N'200i ), Arizona, October 2001.
[12]. Micah Adler, "Tradeoffs in Probabilistic Packet
Marking for IP Traceback," In Proceedings of the Theory of
Computing, 2002.
[13]. John Ioannidis, Steven M. Bellovin, "lmplementing
Pushback: Router—Based Defense Against DDoS Attacks",
In Network and Distributed System Security Symposium,
NDSS '02, February 2002 .
[14]. A. C. Snoeren et al., “Single—Packet IP Traceback,”
IEEE/ACM Trans. Net, Vol. 10, no. 6, Dec. 2002,
pp.721-734.
[15]. NS—2 simulator: vvvvvv.isi.edu/nsnam/ns/.