References
- CERT Advisory CA-1996-21 TCP SYN flooding and IP Spoofing attackts Computer Emergency Response Team
- Computer Denial-of-service attacks trip the Internet L.Garber
- RFC 2827 Network ingress Filtering: Defeating denial of service attacks which employ IP source address spoofing P.Ferguson;D.Senie
- Proc. IEEE INFOCOM '01 On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack K.Park;H.Lee
- Proc. Infocom v.2 Advanced and Authenticated Marking Scheme for IP Traceback D.X.Song;A.Perrig
- RFC 2026, Internet Engineering Task Force TCMP Traceback Messages Steve Bellovin
- Technical Report UW-CSE-2000-02-01, Department of Computer Science and Engineering, University of Washington Practical Network Support for IP Traceback Stefan Savage;David Wetherall;Anna Karlin;Tom Anderson
- Proc. 9th Usenix Security Symp. CenterTrack: an IP overlay network for tracking DoS floods R.Stone
- BBN Technical Memorandum No. 1284 Hash-Based IP Traceback A.C.Snoeren;C.Partridge;L.A.Sanchez;W.T.Strayer;C.E.Jones;F.Tchakountio;S.T.Kent
- Proc. 6th IFIP/IEEE Int'l Symp., Integrated Net., Mmgt. Deciduous : Decentralized Source Identification for Network-based Intrusions H.Y.Chang(et al.)
- RFC 2460 Internet Protocol, Version 6. (IPv6) Specification Deering,S.;R.Hinden
- IEEE Internet Computing Tracing Network Attacks to Their Sources Tatsuya Baba;Shigeyuki Matsuda
- IEEE Communication Magazine On IP Traceback Andrey Belenky;Nirwan Ansari