참고문헌
- L. Gao, "On Inferring Autonomous System Relationships in the Internet," IEEE/ACM Transactions on Networking, vol.9, Issue 6, pp.733-745, 2001. https://doi.org/10.1109/90.974527
- B. Zhang, R. Liu, D. Massey, and L. Zhang, "Collecting the internet AS-level topology," SIGCOMM Computer Communication Review, vol.35, Issue 1, pp.53-61, 2005. https://doi.org/10.1145/1052812.1052825
- Power-Law Relationships of the Internet Topology," In Proc. of ACM SIGCOMM, pp.251-262, 1999.
- Q. Chen, H. Chang, R. Govindan, and S. Jamin, "The origin power laws in Internet topologies revisited," In Proc. of INFOCOM 2002, 2002.
- R. Oliveira, D. Pei, W. Willinger, B. Zhang and L. Zhang, "In Search of the Elusive Ground Truth: The Internet's AS-level Connectivity Structure," In Proc. of SIGMETRICS'08, 2008.
- R. Oliveira, D. Pei, W. Willinger, B. Zhang and L. Zhang, "Quantifying the Completeness of the Observed Internet AS-level Structure," Technical Report TR-080026, Computer Science Department UCLA, 2008.
- RIPE routing information service project, available at http://www.ripe.net
- Route Views routing table archive, available at http://routeviews.org
- UCLA IRL Internet Topology Collection, available at http://irl.cs.ucla.edu/topology
- J. Winick, S. Jamin, "Inet-3.0: Internet Topology Generator. Technical Report, Department of EECS, University of Michigan, 2002.
- C.D. Murta, J.N. Maciel, NIT: The New Internet Topology Generator. Technical Report, Department of Informatics, University Federal of Parana, 2008.
- K. Park and H. Lee, "On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law Internets," In Proc. of ACM SIGCOMM, pp.15-26, 2001.
- J. Mirkovic and P. Reiher, "A taxonomy of DDoS attack and DDoS defense mechanisms," ACM SIGCOMM Computer Communication Review, vol.34, no.2, pp.39-53 Apr. 2004. https://doi.org/10.1145/997150.997156
- W. Lu, M. Tavallaee, and A.A. Ghorbani, "Automatic Discovery of Botnet Communities on Large-Scale Communications Networks," In Proc. of ASIACCS'09, 2009.
- C. Zou, W. Gong, and D. Towsley, "Code Red Worm Propagation Modeling and Analysis," In Proc. of CCS'02, 2002.
- I.V. Beijnum, Building Reliable Networks with the Border Gateway Protocol, O'Reilly, 2002.
- M. Roesch, "Snort Lightweight Intrusion Detection for Networks," In Proc. of USENIX LISA'99, pp.101-109, 1999.
- M.V. Mahoney, "Network Traffic Anomaly Detection Based on Packet Byte," In Proc. of SAC 2003, pp.346-350, 2003.
- L. Feinstein, D. Schnackenberg, R. Balupari, and D. Kindred, "Statistical Approaches to DDoS Attack Detection and Response," In Proc. of DISCEX'03, 2003.