References
- D.C. MacFarland, C.A. Shue, and A.J. Kalafut. "Characterizing Optimal DNS Amplification Attacks and Effective Mitigation," In Passive and Active Measurement 16th Conference, Springer, 2015.
- C. Rossow, "Amplification Hell: Revisiting Network Protocols for DDoS Abuse," In Symposium on Network and Distributed System Security (NDSS), 2014.
- 전자신문, "DDoS 공격 대응 장비 국내 시장 현황," 2010. 4. 27.
- S. Kumar, "Smurf-based Distributed Denial of Service (DDoS) Attack Amplification in Internet," in Proc. Second Inter. Conf. Internet Monitoring and Pretection, 2007.
- A. Householder et al., "Managing the Threat of Denial-ofservice Attacks," 2001, http://resources.sei.cmu.edu/library/
- US-CERT, "UDP-based Amplification Attack," 2014, https://www.us-cert.gov/ncas/alers/TA14-017A
- D. Huistra, "Detecting Reflection Attacks in DNS Flows," 19th Twente Student Conference on IT, Feb. 2013.
- T. Yatagai, T. Isohara, and I. Sasase, "Detection of HTTPGET Flood Attack Based on Analysis of Page Access Behavior," Proc. IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, 2007.
- Y. Choi et al., "AIGG Threshold Based HTTP GET Flooding Attack Detection," Proc. WISA, 2012.
- S. Ranjan et al. "DDoS-Shield: DDoS-Resilient Scheduling to Counter Application Layer Attacks," IEEE/ACM Trans. On Networking, vol. 7, no.1, 2009, pp. 26-39.