Citation: | Fang Zhiyi, Zhang Meiwen, Wei Hua, et al. Study of new measure to recover and control DOS/DDOS atta ck[J]. Journal of Beijing University of Aeronautics and Astronautics, 2004, 30(11): 1033-1037. (in Chinese) |
[1] 杨子翔, 蔡锡钧. Network DOS/DDOS攻击及预防方法之研究 . http://www.ncku.edu.tw/TANET2000/download/ A3-2,2000-10-21/2003-02 Yang Zixiang,Cai Xijun. The study of network DOS/DDOS attack and the technique of prevent . http://www.ncku.edu.tw/TANET2000/download/ A3-2,2000-10-21/2003-02(in Chinese) [2] Raul Mahajan, Sally Floyd. Controlling high-bandwidth flows at the congested router . http://www.cs.washington.edu/homes/ratul/red-pd/paper_icnp.pdf, 2000-11/2003- 02 [3]Vern Paxson. An analysis of using reflectors to defeat DoS traceback.Ausus,t2000 .ftp:ftp.ee.lbl.gov/.vp-reflectors.txt, 2000-8/2003-2 [4]Robert Stone. CenterTrack:an IP overlay network for tracking DoS floods . http://www.arbornetworks.com/downloads/research51/stone00centertrack new.pdf,2000-08/2003-02 [5]Venkatachary Srinivasan, Geroge Varhese. Faster IP lookups using controlled prefix expansion . http://ccrc.wustl.edu/~cheenu/papers/filucpe.ps,1998-02/2003-02 [6]Tennenhouse D L, Smith J M, Sincoskie W D, et al. A survey of active network research[J]. IEEE Communications Magazine, 1997,35(1):80~86
|