SEARCH

SEARCH BY CITATION

REFERENCES

  • 1
    Lu N, Wang Y, Yang F, Xu M. A novel approach for single-packet ip traceback based on routing path. 20th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, IEEE, 2012; 253260.
  • 2
    The Radware's Emergency Response Team(ERT). 2011 Global Application & Network Security Report, 2012. http://www.slideshare.net/Radware/
  • 3
    Matsuda S, Baba T, Hayakawa A, Nakamura T. Design and implementation of unauthorized access tracing system. Proceedings of the 2002 Symposium on Applications and the Internet, IEEE, 2002; 7481.
  • 4
    Snoeren A, Partridge C, Sanchez L, et al. Single-packet ip traceback. IEEE/ACM Transactions on Networking 2002; 10(6):721734.
  • 5
    Lee T, Wu W, Huang T. Scalable packet digesting schemes for ip traceback. International Conference on Communications, Vol. 2, IEEE, 2004; 10081013.
  • 6
    Hilgenstieler E, Duarte E, Mansfield-Keeni G, Shiratori N. Extensions to the source path isolation engine for precise and efficient log-based ip traceback. Computers & Security 2010; 29(4):383392.
  • 7
    Gong C, Sarac K. A more practical approach for single-packet IP traceback using packet logging and marking. IEEE Transactions on Parallel and Distributed Systems 2008; 19(10):13101324.
  • 8
    Bloom B. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM 1970; 13(7):422426.
  • 9
    Callon R, Viswanathan A, Rosen E. Multiprotocol label switching architecture. IETF Request for Comments (RFC) 2001; 3031.
  • 10
    Malliga S, Tamilarasi A. A hybrid scheme using packet marking and logging for ip traceback. International Journal of Internet Protocol Technology 2010; 5(1):8191.
  • 11
    Yang M, Yang M. RIHT: A novel hybrid IP traceback scheme. IEEE Transactions on Information Forensics and Security 2012; 7(2):789797.
  • 12
    Muthuprasanna M, Manimaran G, Alicherry M, Kumar V. Coloring the internet: IP traceback. ICPADS, Vol. 1, IEEE, 2006; 815.
  • 13
    Gong C, Sarac K. Toward a practical packet marking approach for IP traceback. International Journal of Network Security 2009; 8(3):271281.
  • 14
    McCreary S, Claffy K. Trends in wide are IP Traffic Patterns: A View from Ames Internet Exchange, 13th ITC Specialist Seminar Conference on IP Traffic Modeling, Measurement and Management, 2000.
  • 15
    Stoica I, Zhang H. Providing guaranteed services without per flow management. SIGCOMM, ACM 1999; 8194.
  • 16
    Paxson V. Measurements and analysis of end-to-end internet dynamics. PhD Thesis, University of California, Berkeley, 1997
  • 17
    Cooperative Association for Internet Data Analysis (CAIDA). http://www.caida.org/data/active/internet-topology-data-kit/,2011.
  • 18
    Siganos G, Faloutsos M, Faloutsos P, Faloutsos C. Power laws and the as-level internet topology. IEEE/ACM Transactions on Networking 2003; 11(4):514524.
  • 19
    Tarkoma S, Rothenberg C, Lagerspetz E. Theory and practice of bloom filters for distributed systems. IEEE Communications Surveys & Tutorials 2012; 99:125.
  • 20
    John W, Tafvelin S. Analysis of internet backbone traffic and header anomalies observed. SIGCOMM, ACM, 2007; 111116.
  • 21
    omnetpp++. www.omnetpp.org/
  • 22
  • 23
  • 24
    Brandes U. A faster algorithm for betweenness centrality*. Journal of Mathematical Sociology 2001; 25(2):163177.
  • 25
    Savage S, Wetherall D, Karlin A, Anderson T. Network support for IP traceback. IEEE/ACM Transactions on Networking 2001; 9(3):226237.
  • 26
    Yaar A, Perrig A, Song D. Fit: fast internet traceback. INFOCOM, Vol. 2, IEEE, 2005; 13951406.
  • 27
    Goodrich M. Probabilistic packet marking for large-scale IP traceback. IEEE/ACM Transactions on Networking 2008; 16(1):1524.
  • 28
    Belenky A, Ansari N. On deterministic packet marking. Computer Networks 2007; 51(10):26772700.
  • 29
    Xiang Y, Zhou W, Guo M. Flexible deterministic packet marking: an IP traceback system to find the real source of attacks. IEEE Transactions on Parallel and Distributed Systems 2009; 20(4):567580.
  • 30
    Shui Y, Zhou W, Robin D, Weijia J. Traceback of DDoS attacks using entropy variations. IEEE Transactions on Parallel and Distributed Systems 2011; 22(3):412425.