共 23 条
[11]
Lee H., Kwon M., Hasker G., Perrig A., BASE: An incrementally deployable mechanism for viable IP spoofing prevention, Proc. of ASIACCS 2007, pp. 20-31, (2007)
[12]
Yaar A., Perrig A., Song D., SIFF: A stateless internet flow filter to mitigate DDoS flooding attacks, IEEE Symposium on Security and Privacy, pp. 130-143, (2004)
[13]
Yau L., Liang, Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles, Proc. of the IEEE International Workshop on Quality of Service (IWQoS), pp. 35-44, (2002)
[14]
Savage S., Wetherall D., Karlin A., Anderson T., Practical Network Support for IP Traceback, Proc. of ACM SIGCOMM, pp. 295-396, (2000)
[15]
Yaar A., Perrig A., Song D.X., Pi: A path identification mechanism to defend against DDoS attack, IEEE Symposium on Security and Privacy, pp. 93-109, (2003)
[16]
Sung M., Xu J., IP Traceback-based Intelligent Packet Filtering: A Novel Technique for Defending Against Internet DDoS Attacks, IEEE Transactions on Parallel and Distributed Systems, 14, 9, pp. 861-872, (2003)
[17]
Seo D., Lee H., Perring A., PFS: Probabilistic Filter Scheduling Against Distributed Denial-of-Service Attacks, Proc. of the 2011 IEEE 36th Conference on Local Computer Networks, pp. 9-17, (2011)
[18]
Song D.X., Perring A., Advanced and authenticated marking schemes for IP traceback, Proc. of INFOCOM 2001, 2, pp. 878-886, (2001)
[19]
Genetic Algorithm
[20]
Cooperative association for internet data analysis