[1] |
SANDERS C, SMITH J.Applied Network Security Monitoring: Collection, Detection, and Analysis[M]. New York: Syngress Publishing, 2013.
|
[2] |
CHEN Zhouguo, PU Shi, ZHU Shixiong.General Traceback Technical Framework for Internet.[J] Computer Systems & Applications, 2012, 21(9): 166-170.
|
|
陈周国,蒲石,祝世雄.一种通用的互联网追踪溯源技术框架[J].计算机系统应用,2012,21(9):166-170.
|
[3] |
CHEN Zhouguo, PU Shi, ZHU Shixiong.Levels Analysis of Network Attack Traceback.[J] Computer Systems & Applications, 2014, 23(1): 1-7.
|
|
陈周国,蒲石,祝世雄.网络攻击追踪溯源层次分析[J].计算机系统应用,2014,23(1):1-7.
|
[4] |
ALENEZI M, REED M J.IP Traceback Methodologies[C]// IEEE . 2011 3rd Computer Science and Electronic Engineering Conference (CEEC), July 13-14,2011, Colchester, UK. New York:IEEE, 2011: 98-102.
|
[5] |
BELLOVIN S. ICMP Traceback Message[EB/OL]. , 2019-9-15.
|
[6] |
BABA T, MATSUDA S.Tracing Network Attacks to Their Sources[J]. IEEE Internet Computing, 2002, 6(2): 1-26.
|
[7] |
FENG Bo, GUO Fan, TAN Suwen.Attack Source Traceback Scheme Based on Probabilistic Packet Marking for IPv6 Network[J]. Computer Engineering and Applications, 2016, 52(6): 102-106.
|
|
冯波,郭帆,谭素雯.基于IPv6的概率包标记路径溯源方案[J].计算机工程与应用, 2016, 52(6):102-106.
|
[8] |
ZHU Tian, TIAN Ye, MA Di, et al.Packet Verification Based Traceback Method for IPv6 Translation Mechanism[J]. Journal of Computer Applications, 2013, 33(4): 926-930.
|
|
朱田,田野,马迪,等.基于包验证的面向IPv6翻译机制的IP追溯方法[J].计算机应用, 2013, 33(4):926-930.
|
[9] |
YANG M, YANG M.RIHT: A Novel Hybrid IP Traceback Scheme[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 789-797.
|
[10] |
SINGH K, SINGH P, KUMAR K, et al.A Systematic Review of IP Traceback Schemes for Denial of Service Attacks[J]. Computers & Security, 2016, 25(8): 111-139.
|
[11] |
MANKIN A, MASSEY D, WU ChienLung, et al. On Design and Evaluation of Intention-Driven ICMP Traceback[C]// IEEE. Proceedings Tenth International Conference on Computer Communications and Networks, October 15-17, 2002, Scottsdale, AZ, USA. New York:IEEE, 2002: 3-28.
|
[12] |
SAURABH S, SAIRAM A S.ICMP based IP Traceback with Negligible Overhead for Highly Distributed Reflector Attack Using Bloom Filters[J]. Computer Communications, 2014, 42(2): 60-69.
|
[13] |
GAO Z.Tracing Cyber Attacks from the Practical Perspective[J]. IEEE Communications Magazine, 2005, 43(5): 123-131.
|
[14] |
MURUGESAN V, SHALINIE M, YANG M H.Design and Analysis of Hybrid Single Packet IP Traceback Scheme[J]. Iet Networks, 2018, 7(3): 141-151.
|
[15] |
CARPENTER B. Transmission and Processing of IPv6 Extension Headers [EB/OL].,2019-9-15.
|
[16] |
MANDHAR V, RANGA V. IP Traceback Schemes for DDoS Attack[EB/OL]. , 2019-9-15.
|
[17] |
KAMALDEEP K, MALIK M, DUTTA M.Implementation of single-Packet Hybrid IP Traceback for IPv4 and IPv6 Networks[J]. IET Information Security, 2018, 12(1): 1-6.
|
[18] |
PARASHAR A, RADHAKRISHNAN R. Improved Deterministic Packet Marking Algorithm for IPv6 Traceback[EB/OL]. , 2019-9-15.
|
[19] |
YIM H B , JUNG J I . IP Traceback Algorithm for DoS/DDoS Attack[EB/OL]. , 2019-9-15.
|
[20] |
LU Ning, WANG Shangguang, LI Feng, et al.Dynamically Scalable and Efficient Approach for Single-Packet Traceback[J]. Journal of Software, 2018, 29(11): 320-340.
|
|
鲁宁,王尚广,李峰.可动态扩展的高效单包溯源方法[J].软件学报, 2018, 29(11):320-340.
|