參考文獻 |
[1] Computer Emergency Response Team Coordination Center, CERT/CC, http://ww.cert.org.
[2] Taiwan Computer Emergency Response Team Coordination Center, TWCERT/CC, http://www.cert.org.tw.
[3] CERT/CC Overview Incident and Vulnerability Trends, CERT Coordination Center, Pittsburgh, http://www.cert.org/present/cert-overview-trends/, 2002.
[4] McAfee, Inc., http://vil.nai.com/vil/default.asp.
[5] D. Moore, G..M. Voelker, and S. Savage, “Inferring Internet denial-of-service activity”, Proceedings of 10th USENIX Security Symposium, Washington, DC, 2001.
[6] Jelena Mirkovic, Janice Martin, and Peter Reiher, “A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms,” UCLA Technical Report #020018, 2002.
[7] Rocky K. C., Chang, “Defending against flooding-based distributed denial-of-service attack: a tutorial,” IEEE Communication Magazine, Vol. 40, pp. 42-51, Oct. 2002.
[8] CERT Advisory CA-2003-04 MS-SQL Server Worm, http://www.cert.org/advisories/CA-2003-04.html.
[9] CERT Advisory CA-1996-21 TCP SYN Flooding and IP Spoofing Attacks, http://www.cert.org/advisories/CA-1996-21.html.
[10] D. Senie, “Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing”, RFC 2827, http://www.ietf.org/rfc/rfc2827.txt, May 2000.
[11] CERT Advisory CA-1996-01 UDP Port Denial-of-Service Attacks, http://www.cert.org/advisories/CA-1996-01.html.
[12] CERT Advisory CA-1998-01 Smurf IP Denial-of-Service Attacks, http://www.cert.org/advisories/CA-1998-01.html.
[13] CERT Advisory CA-1997-28 IP Denial-of-Service Attacks, http://www.cert.org/advisories/CA-1997-28.html.
[14] D. Schnackenberg, K. Djahandari, and D. Sterne, “Infrastructure for intrusion detection and response”, Proceedings of DARPA Information Survivability Conference and Exposition (DISCEX), South Carolina, Jan. 2000.
[15] Thomas R., Mark B., Johnson T., Croall, J.,"NetBouncer: client-legitimacy-based high-performance DDoS filtering," Proceedings of Conference and Exposition on DARPA Information Survivability, Washington, DC, vol.1, pp. 14-25, April 2003.
[16] M. Roghan, D. Veitch, and P. Abry. “Real-time estimation of the parameters of long-range dependence,” IEEE/ACM RANS. on Networking, Vol.8, pp 467-478,Aug. 2000.
[17] K. Fox, R. Henning, J. Reed, and R. Simonian, “A Neural Network Approach Towards Intrusion Detection,” Technical Report, Harris Corporation, July 1990.
[18] T. M. Gil and M. Poletto, “MULTOPS: a data-structure for bandwidth attack detection,” Proceedings of 10th Usenix Security Symposium, Washington, DC, August 2001.
[19] P. Barford, J. Kline, D. Plonka and A.Ron, “A signal analysis of network traffic anomalies,” Internet Measurement Workshop, Marseille, FranceNov. 2002.
[20] L. Feinstein, D. Schnackenberg, R. Balupari, and D. Kindred, "Statistical Approaches to DDoS Attack Detection and Response," Proceedings of DISCEX 3, April 2003.
[21] Jiejun Kong; Mirza, M.; Shu, J.; Yoedhana, C.; Gerla, M.; Songwu Lu, "Random flow network modeling and simulations for DDoS attack mitigation," Proceedings of ICC IEEE International Conference on Communications, Alask, USA, vol.1, pp. 487 - 491, 11-15 May 2003.
[22] T. Peng, C. Leckie and R. Kotagiri, "Protection from Distributed Denial of Service Attack Using History-based IP Filtering," Proceedings of IEEE International Conference on Communications, Anchorage, Alaska, USA, May 2003.
[23] Belenky, A.; Ansari, N., "On IP traceback," IEEE Communications Magazine, vol.41, pp.142-153, July 2003.
[24] Minho Sung; Jun Xu, "IP traceback-based intelligent packet filtering: a novel technique for defending against Internet DDoS attacks," IEEE Transactions on Parallel and Distributed Systems, vol.14, pp. 861-872, Sept. 2003.
[25] H. Burch and B. Cheswick, “Tracing anonymous packets to their approximate source,” Proceedings of the 14th Systems Administration Conference, New Orleansm Louisiana, U.S.A., December 2000.
[26] M.Oe, "A hierarchical architecture for IP Traceback," Proceedings of 54th IETF, BoF, Yokohama, Japan, , Jul. 2002.
[27] A. Yaar, A. Perrig, and D. Song, “PI: A Path Identification Mechanism to Defend against DDoS Attacks,” Proceedings of IEEE Symposium on Security and Privacy, pp. 93-107, May 2003.
[28] R. Russell and H. Welte, “Linux Netfilter Hacking HOWTO,” http://www.netfilter.org/documentation/HOWTO/netfilter-hacking-HOWTO.html.
[29] B. Hubert, “Linux Advanced Routing and Traffic Control HOWTO,” http://lartc.org/howto/.
[30] S. Ioannidis, A. D. Keromytis, S. M. Bellovin, and J. M. Smith, “Implementing a Distributed Firewall”, Proceedings of 7th ACM Conference on Computer and Communication Security, Athens, Greece, Nov. 2000.
[31] M. Roesch, “Snort - Lightweight Intrusion Detection for Networks,” Proceedings of the 13th Systems Administration Conference (LISA'99), USENIX Association, pp. 229-238, 1999.
[32] K. Hwang and M. Gangadharan, “Micro-Firewalls for Dynamic Network Security with Distributed Intrusion Detection,” Proceedings of IEEE International Symposium on Network Computing and Applications, pp. 68-79, Oct. 2001.
[33] M. Gangadhran and K. Hwang, “Intranet Secuity with Micro-Firewalls and Mobil Agent for Proactive Intrusion Response,” Proceedings of IEEE Int’l Conferences on Computer Networks and Mobile Computing, Beijing, China, Oct. 2001.
[34] Wei Yu, Dong Xuan, Wei Zhao, "Middleware-based approach for preventing distributed deny of service attacks," Proceedings of MILCOM, vol. 2, pp.1124-1129, Oct. 2002.
[35] J. Mirkovic, G. Prier and P. Reiher, “Attacking DDoS at the Source,” Proceedings of ICNP, pp. 312-321, Paris, France, November 2002.
[36] Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, and Scott Shenker, “Controlling High Bandwidth Aggregates in the Network,” Computer Communications Review 32:3, pp. 62-73, July 2002.
[37] John Ioannidis and Steven M. Bellovin, “Implementing Pushback: Router-Based Defense DDoS Attacks”, Proceedings of NDSS, February 2002.
[38] K. Park and H. Lee, “On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets,” Proceedings of ACM SIGCOMM, August 2001.
[39] J. Ioannidis and S. M. Bellovin, “Pushback: Router-Based Defense Against DDoS Attacks,” Proceedings of NDSS, February 2002.
[40] CERT, Intruder Detection Checklist, Jul 20, 1999. http://www.cert.org/tech_tips/intruder_detection_checklist.html.
[41] G. Vigna, R.A. Kemmerer, and P. Blix, "Stateful Intrusion Detection for High-Speed Networks," Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID 2001), pp.69-84, Springer-Verlag avis, CA, Oct. 2001.
[42] Byeong Kil Lee and Lizy John, "NpBench: A Benchmark Suite for Control Plane and Data Plane Applications for Network Processors," Proceedings of the International Conference on Computer Design (ICCD'03), San Jose, Oct. 2003.
[43] BroadWeb, http://www.broadweb.com.tw. |