參考文獻 |
[1] Williams, M., EBay, Amazon, Buy.com hit by attacks, 2000. http://www.nwfusion.com/news/2000/0209attack.html
[2] Fonseca, B., Yahoo outage raises Web concerns, 2000 http://www.nwfusion.com/news/2000/0209yahoo2.html
[3] E. Eugene Schultz, “The MSBlaster worm: going from bad to worse,” in Network Security, vol. 2003, no. 10, pp. 4-8, Oct. 2003.
[4] Brian McKenna, “Cisco and Trend Micro tighten collaboration around Sasser-like attacks,” in Network Security, vol. 2004, no. 6, pp 3, June 2004.
[5] Andrey Belenky and Nirwan Ansari, “On IP Traceback,” in IEEE Communication Magazine, July 2003, pp. 142-153.
[6] Zhiqiang Gao and Nirwan Ansari, “Traceing Cyber Attacks from the Practical Perspective,” in IEEE Communications Magazine, May 2005, pp. 123-131.
[7] Rocky K. C. Chang, “Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial,” in IEEE Communications Magazine, Oct. 2002, pp. 42-51.
[8] Jelena Mirkovic and Peter Reiher, “A Taxonomy of DDoS Attack and DDoS Defense Mechanisms,” in ACM SIGCOMM Computer Communications Review, vol. 34, no. 2, Apr. 2004, pp. 39-54.
[9] Noureldien, N, “Protecting web servers from DoS/DDoS flooding attacks: a technical overview,” in International Conference on Web-Management for International Organizations, October 2002.
[10] “The smurf denial-of-service attack,” in Network Security, vol. 1998, no. 1, pp. 2, Jan. 1998.
[11] “TCP SYN flooding and IP spoofing attacks,” in Network Security, vol. 1996, no. 10, pp. 2, Oct. 1996.
[12] UDP flood attacks, http://www.javvin.com/networksecurity/UDPFloodAttack.html
[13] ICMP flood attacks, http://www.anml.iu.edu/ddos/types.html
[14] Yoohwan Kim, Ju-Yeon Jo, Chao, H.J. and Merat, F., “High-speed router filter for blocking TCP flooding under DDoS attack,” in Proceedings of the 2003 IEEE International Performance, Computing, and Communications Conference.
[15] Jelena Mirkovic, Gregory Prier and Peter Reiher, “Attacking DDoS at the Source,” in Proceedings of ICNP 2002, Nov. 2002, pp. 312-321.
[16] Mirkovic, J. and Reiher, P., “D-WARD: a source-end defense against flooding denial-of-service attacks,” in IEEE Transactions on Dependable and Secure Computing, vol. 2, no. 3, July-Sept. 2005, pp. 216-232.
[17] Thomas Dubendorfer, Matthias Bossardt, Bernhard Plattner, “Adaptive Distributed Traffic Control Service for DDoS Attack Mitigation,” in Proceedings of the 19th IEEE Intermational Parallel and Distributed Processing Symposium, April 2005
[18] D. L. Cook, W. G. Morein, A. D. Keromytis, V. Misra and D. Rubenstein, “WebSOS: Protecting Web Servers from DDoS Attacks,” in 11th IEEE International Conference 2003, pp. 461-466.
[19] Ju Wang, Linyuan Lu and Andrew A. Chien, “Tolerating Denial-of-Service Attacks Using Overlay Networks – Impact of Topology,” in ACM SSRS 2003, Oct. 2003.
[20] A. D. Keromytis, V. Misra, and D. Rubenstein, “SOS: An Architecture for Mitigating DDoS Attacks,” in IEEE Journal On Selected Areas In Communications, vol. 22, no. 1, Jan. 2004.
[21] Angelos Stavrou, Angelos D. Keromytis, Jason Nieh, Vishal Misra and Dan Rubenstein, “MOVE: An End-to-End Solution To Network Denial of Service,” in Internet Society NDSS’05, Feb. 2005.
[22] Steven Osman, Dinesh Subhraveti, Gong Su and Jason Nieh, “The Design and Implementation of Zap: A System for Migrating Computing Environments,” in Proc. Of the 5th Symposium on Operating Systems Design and Implementation, Dec. 2002.
[23] 陳俊傑,楊宏昌,林宏達,游秉賢,曾黎明,“以重疊網路防禦分散式阻斷服務攻擊,” 台灣網際網路研討會2005.
[24] H. Burch and B. Cheswick, “Tracing Anonymous Packets to Their Approximate Source,” in Proc. USENIX LISA, 2000, pp. 319-327.
[25] R. Stone, “Centertrack: An IP Overlay Network for Tracking DoS Floods,” in Proc. 9th USENIX Sec. Symp., 2000, pp. 199-212.
[26] A. Belenky and N. Ansari, “Tracing Multiple Attackers with Deterministic Packet Marking (DPM),” in Proc. 2003 IEEE Pacific Rim Conf. Commun., Comp. and Sig. Proc., Victoria, BC, Canada, Aug, 2003
[27] Stefan Savage, David Wetherall, Anna Karlin and Tom Anderson, “Practical Network Support for IP Traceback,” in IEEE/ACM Transactions on Networking, vol. 9, pp. 226-237, June 2001.
[28] Y. Tseng, H. Chen and W. Hsieh, “Probabilistic Packet Marking with Non-Preemptive Compensation,” in IEEE Communication Letter, vol. 8, no. 6, pp.359-361, June 2004.
[29] Terence K.T.Law, John C.S. Lui, “You Can Run, But You Can’t Hide: An Effective Statistical Methodology to Trace Back DDoS Attackers,” in IEEE Transactions On Parallel And Distributed Systems, vol. 16, no. 9, pp.799-813, Sept. 2005.
[30] Dawn Xiaodong Song and Adrian Perrig, “Advanced and Authenticated Marking Schemes for IP Traceback,” in IEEE INFOCOM, 2001.
[31] Miao Ma, “Tabu Marking Scheme for IP Traceback,” in IEEE International Parallel and Distributed Processing Symposium, 2005.
[32] FreeBSD, http://www.freebsd.org/
[33] The Chord Project, http://pdos.csail.mit.edu/chord/
[34] Squid, http://www.squid-cache.org/
[35] Information Sciences Institute University of Southern California,“Internet Protocol,” RFC791, Sep. 1981.
[36] I. Stoica and H. Zhang, “Providing Guaranteed Services Without Per Flow Management, ” in Proceedings of the 1999 ACM SIGCOMM Conference, pp 81–94, Aug. 1999.
[37] W. Richard Stevens, “TCP/IP Illustrated Volume 1, The Protocols,” Addison-Wesley.
[38] Snort, http://www.snort.org/
[39] DDoS attack tool timeline, http://staff.washington.edu/dittrich/talks/sec2000/timeline.html
[40] Tfn attack tool analysis, http://staff.washington.edu/dittrich/misc/tfn.analysis.txt
[41] stacheldraht attack tool analysis, http://staff.washington.edu./dittrich/misc/stacheldraht.analysis.txt
[42] TFN2K attack tool analysis, http://packetstormsecurity.com/distributed/TFN2K_Analysis-1.3.txt
[43] Shaft attack tool analysis, http://home.adelphi.edu/~spock/shaft_analysis.txt |