References
- P. Mockapetris, Domain names - concepts and facilities, Internet Request for Comments (RFC 1034), November 1987.
- P. Albitz and C. Liu, DNS and BIND, O'Reilly and Associates, 1998.
- H. Rood, "What is in a name, what is in a number: some characteristics of identifiers on electronic networks," Telecommunications Policy, vol.24, pp.533-552, 2000. https://doi.org/10.1016/S0308-5961(00)00049-5
- Lajos Takács, "A single-server queue with limited virtual waiting time," Journal of Applied Probability, vol.11, no.3, pp.612-617, 1974. https://doi.org/10.2307/3212710
- Do Le Minha, "The GI/G/1 queue with uniformly limited virtual waiting times; the finite dam," Advances in Applied Probability, vol.12, no.2, pp. 501-516, 1980. https://doi.org/10.2307/1426609
- Do Le Minha, "The single-server queue with uniformly limited actual waiting times," Optimization, vol.12, no.4, pp.607-621, 1981.
- J. Van Velthoven, B. Van Houdt, and C. Blondia, "On the probability of abandonment in queues with limited sojourn and waiting times," Operations Research Letters, vol.34, no.3, pp. 333-338, 2006. https://doi.org/10.1016/j.orl.2005.05.008
- H. Yang, H. Luo, Y. Yang, S. Lu, and L. Zhang. "HOURS: Achieving DoS resilience in an open service hierarchy," in Proc. of the International Conference on Dependable Systems and Networks, Palazzo dei Congressi, Florence, Italy, pp.83-93, 2004.
- K. Parka, V. Pai, L. Peterson, and Z. Wang. "CoDNS: Improving DNS performance and reliability via cooperative lookups," in Proc. of the 6th conference on Symposium on Opearting Systems Design & Implementation, San Francisco, CA, pp.14-14, 2004.
- Hitesh Ballani and Paul Francis. "Mitigating DNS DoS attacks," in Proc. of the 15th ACM conference on Computer and communications security, Alexandria, Virginia, pp.189-198, 2008.
- D.M. Koppelman, "Congested Banyan network analysis using congested-queue states and neighboring queue effects," IEEE/ACM Transactions on Networking, vol.4, no.1, pp. 106-111, 2006.
- H.C. Tijms, Algorithmic Analysis of Queues, Wiley, Chichester, 2003.
- V. Bhaskar, L. Joiner, "Modeling scheduled dataflow architecture - an open queuing network model approach," Int. J. Pure Appl. Math. vol. 18, no. 3, pp. 271-283, 2005.
- V. Bhaskar, K. Adjallah, "A hybrid open queuing network approach for multi-threaded dataflow architecture," Int. J. Comput. Commun. vol. 31, no. 17, pp. 4098-4106, 2008. https://doi.org/10.1016/j.comcom.2008.08.017
- V. Bhaskar, K. Adjallah, "A hybrid closed queuing network approach to model dataflow in network distributed processors," Int. J. Comput. Commun. vol. 31, no. 1, pp. 119-128, 2008. https://doi.org/10.1016/j.comcom.2007.10.027
- V. Bhaskar, "A hybrid closed queuing network model for multi-threaded dataflow architecture," Int. J. Comput. Electric. Eng. vol. 31, no. 8, pp. 556-571, November 2005. https://doi.org/10.1016/j.compeleceng.2005.08.001
- V. Bhaskar, G. Lavanya, "Equivalent single-queue-single-server model for a Pentium processor," Applied Mathematical Modelling, vol. 34, no. 9, pp. 2531-2545, September 2010. https://doi.org/10.1016/j.apm.2009.11.018
- V. Paxson, S. Floyd, "Wide-area Traffic: The Failure of Poisson Modeling," IEEE/ACM Transactions on Networking, vol. 3, no. 3, pp. 226-244, June 1995. https://doi.org/10.1109/90.392383
- R. H. Riedi, W. Willinger, "Towards an improved understanding of network traffic dynamics," Selfsimilar Network Traffic and Performance Evaluation, Wiley, 2000, chapter 20, pp. 507-530.
- A. J. Marie, Y. Calas, and T. Alemu, "On the compromise between burstiness and frequency of events," Performance Evaluation, vol. 62, no. 1-4, pp. 382-399, 2005. https://doi.org/10.1016/j.peva.2005.07.020
- R. Jain, S. Routhier, "Packet Trains--Measurements and a New Model for Computer Network Traffic," IEEE Journal on Selected Areas in Communications, vol. 4, no. 6, pp. 986-995, 1986. https://doi.org/10.1109/JSAC.1986.1146410
- T. Karagiannis, M. Molle, and M. Faloutsos, "A Nonstationary Poisson View of Internet Traffic," in Proc. of the 23th Annual Joint Conference of the IEEE Computer and Communications Societies, San Francisco, CA, pp. 1558-1569, 2004.
- W. Cleveland, D. Lin, and D. Sun, "Internet traffic tends toward Poisson and independent as the load increases," Nonlinear Estimation and Classification, D. Denison, M. Hansen, C. Holmes, B. Mallick, and B. Yu, Eds. New York, NY: Springer Verlag, Dec. 2002.
- D. Manjunath, B. Sikdar, "Input queued switches for variable length packets: analysis for Poisson and self-similar traffic," Computer Communications, vol.25, no.6, pp. 590-610, 2002. https://doi.org/10.1016/S0140-3664(01)00426-1
- A. Kamath, O. Palmon, and S. Plotkin, "Routing and Admission Control in General Topology Networks with Poisson Arrivals," Journal of Algorithms, vol. 27, no. 2, pp. 236-258, 1998. https://doi.org/10.1006/jagm.1997.0923
- T. Field, U. Harder, and P. Harrison, Network traffic behaviour in switched Ethernet systems, Performance Evaluation, vol. 58, no. 2-3, pp. 243-260, 2004. https://doi.org/10.1016/j.peva.2004.07.017
- S.M. Ross, Introduction to Probability Models (6th ed.), Academic Press, London, 1997.
- Ruoyu Yan, Qinghua Zheng and Haifei Li, "Combining Adaptive Filtering and IF Flows to Detect DDoS Attacks within a Router," KSII Transactions on Internet and Information Systems, vol.4, no.3, pp. 428-451, June 2010.
- Zhu Jian-Qi, Fu Feng, Chong-kwon Kim, Yin Ke-xin and Liu Yan-Heng, "A DoS Detection Method Based on Composition Self-similarity," KSII Transactions on Internet and Information Systems, vol.6, no.5, pp. 1463-1478, May 2012.