參考文獻 |
[1] Kaspersky Lab. DDoS attacks in Q1 2019 [Online]. Available: https://securelist.com/ddos-report-q1-2019/90792/
[2] Carlos Morales NETSCOUT Arbor Confirms 1.7 Tbps DDoS Attack; The Terabit Attack Era Is Upon Us [Online]. Available:
https://www.netscout.com/blog/asert/netscout-arbor-confirms-17-tbps-ddos-attack-terabit-attack-era
[3] Sam Kottler February 28th DDoS Incident Report [Online]. Available: https://github.blog/2018-03-01-ddos-incident-report/
[4] Yi Xie, Shun-Zheng Yu, "Monitoring the Application-Layer DDoS Attacks for Popular websites", IEEE/ACM Trans on Networking, vol. 17, no. 1, pp. 15-25, Feb 2009.
[5] Garber Lee, "Denial-of-Service Attack Rip the Internet", ACM Computer, vol. 33, no. 4, pp. 12-17, April 2000.
[6] Roy Mark Oregon Man Cops Plea in eBay DDOS Attack [Online]. Available: http://www.internetnews.com/security/article.php/3574101
[7] Jignesh Vania, Arvind Meniya, H. B. Jethva, "A Review on Botnet and Detection Technique", International Journal of Computer Trends and Technology vol.4 Issue 1 2013
[8] E. Alomari, S. Manickam, B. B. Gupta, S. Karuppayah, R. Alfaris, "Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art" International Journal of Computer Applications, vol. 49, no. 7, pp. 24-32, Jul. 2012.
[9] Hoque, N., Bhattacharyya, D., Kalita, J., "Botnet in DDoS attacks: trends and challenges. ", IEEE Commun. Surv. Tutor. 99, 1–1 (2015)
[10] Kolias, C.; Kambourakis, G.; Stavrou, A.; Voas, J. "DDoS in the IoT: Mirai and other botnets. ", Computer. 2017, 50, 80–84.
[11] Harry Halpin The Philosophy of Anonymous [Online]. Available: https://www.radicalphilosophy.com/article/the-philosophy-of-anonymous
[12] T Peng, C Leckie, . K Ramamohanarao, "Survey of Network-based Defense Mechanisms Countering the DoS and DDoS Problems", ACM Computing Surveys, vol. 39, no. 1, April 2007.
[13] A. Studer and A. Perrig. "The Coremelt Attack. ", Proceedings of the European Symposium on Researchin Computer Security (ESORICS), Saint Malo, France,September 2009.
[14] J. Lemon, "Resisting SYN flooding DoS attacks with a SYN cache", Proceedings of USENIX BSDCon′2002, February 2002.
[15] D.J. Bernstein, E. Schenk, "Linux kernel SYN cookies firewall project"
[16] S.w. Shin, K.y. Kim, J.s. Jang, "D-SAT: detecting SYN flooding attack by two-stage statistical approach", Applications and the Internet, 2005
[17] Lim, S.; Ha, J.; Kim, H.; Kim, Y.; Yang, S.: "A SDN-oriented DDoS blocking scheme for botnet-based attacks". Sixth International Conference on Ubiquitous and Future Networks (ICUFN), pp. 63–68. IEEE (2014)
[18] N. Z. Bawany, J. A. Shamsi, and K. Salah, "DDoS attack detection and mitigation using SDN: methods, practices, and solutions", Arabian Journal for Science and Engineering, vol. 42, no. 2, pp. 425–441, 2017.
[19] Python documentation 16.3. thread — Multiple threads of control — [Online]. Available: https://docs.python.org/2/library/thread.html
[20] Python documentation 16.1. select — Waiting for I/O completion [Online]. Available: https://docs.python.org/2/library/select.html
[21] mondain GitHub - mondain/public-stun-list.txt [Online]. Available: https://gist.github.com/mondain/b0ec1cf5f60ae726202e
[22] PyPI pystun [Online]. Available: https://pypi.org/project/pystun/
[23] jtriley. GitHub - jtriley/pystun [Online]. Available: https://github.com/jtriley/pystun
[24] psutil documentation [Online]. Available: https://psutil.readthedocs.io/en/latest/
[25] Python documentation 15.3. time — Time access and conversions [Online]. Available: https://docs.python.org/2/library/time.html
[26] R. Mahy, "Traversal Using Relays around NAT (TURN): Relay Extensions to Session Traversal Utilities for NAT (STUN)", IETF RFC 5766, 2010
|