[1]
Hamadeh I, Kesidis G. A Taxonomy of Internet Traceback[J].Security and Networks,2006,1(1/2): 54-61. [1] Hamadeh I, Kesidis G. A Taxonomy of Internet Traceback [J]. Security and Networks, 2006,1 (1 / 2): 54-61.
DOI: 10.1504/ijsn.2006.010823
Google Scholar
[2]
Burch H, Cheswick B. Tracing Anonymous Packets to Their Approximate Source[C]//Proc. of the 14th Conf. on Systems Administration. Usenix Assoc:[sn],2008.
Google Scholar
[3]
Savage S, Wetherall D, Karlin A. Practical Network Support for IP Traceback[C] Proceedings of the 2000 ACM SIGCOMM Conference, Stockholm, Sweden, 2008-08: 295-306. [3] Savage S, Wetherall D, Karlin A. Practical Network Support for IP Traceback [C] Proceedings of the 2000 ACM SIGCOMM Conference, Stockholm, Sweden, 2008-08: 295-306.
DOI: 10.1145/347057.347560
Google Scholar
[4]
Song Dawn, Perrig A. Advanced and Authenticated Marking Schemes for IP Traceback.[C] //Proc. of IEEE INFOCOM'01.[Sl]:IEEE Press,2009. [4] Song Dawn, Perrig A. Advanced and Authenticated Marking Schemes for IP Traceback. [C] / / Proc. Of IEEE INFOCOM'01. [Sl]: IEEE Press, 2009.
DOI: 10.1109/infcom.2001.916279
Google Scholar
[5]
Park K, Lee H. On the Effectiveness of Probabilistic Packet Marking for IP Traceback Under Denial of Service Attack[C]//Proc. of IEEE INFOCOM'01. Anchorage, Alaska, USA:IEEE Press,2009. [5] Park K, Lee H. On the Effectiveness of Probabilistic Packet Marking for IP Traceback Under Denial of Service Attack [C] / / Proc. Of IEEE INFOCOM'01. Anchorage, Alaska, USA: IEEE Press, 2009.
DOI: 10.1109/infcom.2001.916716
Google Scholar
[6]
De-Quan Su Pu Rui, FENG Deng. Packet marking for IP tracking the annotation [J]. Journal of Software, 2004,15 (2): 250-258.
Google Scholar
[7]
Li Quan, Xu D, Su Pu Rui, FENG Deng. IP tracking in the adaptive packet marking [J]. Electronics Technology, 2004,32 (8) :1334-1337
Google Scholar
[8]
Boneh A, Hofrim. The coupon-collector Problem Revisited [J]. Commun Statist Stochastic Models, 2005,13 (1) :39-66.
Google Scholar
[9]
Zhu Jian, Liu Yuan, Li Xiuzhen based on the IP packet marking non-repeated follow-up study [J]. Computer Applications, 2007, 11:2694-2696.
Google Scholar
[10]
Liangfeng, Zhao new by adaptive random packet marking to achieve real-time IP traceback [J]. Journal of Software, 2003,14 (5): l005-l010.
Google Scholar
[11]
Stoica.I, Zhang.H. Providing Guaranteed Services Without Per Flow Management [C].Proceedings of the 1999 ACM SIGCOMM Conference,2007:81-94. [11] Stoica.I, Zhang.H. Providing Guaranteed Services Without Per Flow Management [C]. Proceedings of the 1999 ACM SIGCOMM Conference ,2007:81-94.
DOI: 10.1145/316194.316208
Google Scholar
[12]
Qu Haipeng, Li Quan, Pu Su Rui, etc. mark a sub-block the IP packet tracing program [J]. Computer Research and Development, 2005,42 (12): 2084-2092.
Google Scholar
[13]
Qu Haipeng, Deng-Guo Feng, Su Rui Pu based on ordered labeled IP packet tracing program [J]. Electronics Technology, 2006,34 (1) :173-176.
Google Scholar
[14]
Chen stars, Xu Hongyun. IP tracking in the PPM Algorithm Research [J]. Computer Engineering, 2006, 32 (21): 1642166.
Google Scholar