REFERENCES
- C. Rossow, “Amplification hell: revisiting network protocols for DDoS abuse,” in Symposium on Network and Distributed System Security (NDSS), Feb. 2014.
- B. H. Bloom, “Space/time trade-offs in hash coding with allowable errors,” Commun. ACM, Vol. 13, no. 7, pp. 422–426, July 1970. doi: https://doi.org/10.1145/362686.362692
- A. Broder and M. Mitzenmacher, “Network applications of bloom filters: a survey,” Internet Math., Vol. 1, no. 4, pp. 485–509, Jan. 2004. doi: https://doi.org/10.1080/15427951.2004.10129096
- Waikato Applied Network Dynamic Research Group. Available: http://wand.net.nz/wits/auck/8/
- Waikato Applied Network Dynamic Research Group. Available: http://wand.net.nz/wits/waikato/8/
- Waikato Applied Network Dynamic Research Group. Available: http://research.wand.net.nz/software/libtrace.php
- S. Savage, D. Wetherall, A. Karlin, and T. Anderson, “Practical network support for IP traceback,” Comput. Commun. Rev., Vol. 30, no. 4, pp. 295–306, Aug. 2000. doi: https://doi.org/10.1145/347057.347560
- H. Tian, J. Bi, X. Jiang, and W. Zhang, “A probabilistic marking scheme for fast traceback,” in Second International Conference on Evolving Internet (INTERNET), IEEE, Sept. 2010, pp. 137–141.
- P. Sattari, M. Gjoka, and A. Markopoulou, “A network coding approach to IP traceback,” in Proceedings of IEEE International Symposium on Network Coding, June 2010, pp. 1–6.
- A. Belenky and N. Ansari, “IP traceback with deterministic packet marking,” IEEE Commun. Lett., Vol. 7, no. 4, pp. 162–164, Apr. 2003. doi: https://doi.org/10.1109/LCOMM.2003.811200
- A. Belenky and N. Ansari, “Tracing multiple attackers with deterministic packet marking (DPM),” in Proceedings of IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, vol. 1, Aug. 2003, p. 4952.
- F.-Y. Lee and S. Shieh, “Defending against spoofed DDoS attacks with path fingerprint,” Comput. Sec., Vol. 24, no. 7, pp. 571–586, Oct. 2005. doi: https://doi.org/10.1016/j.cose.2005.03.005
- A. Yaar, A. Perrig, and D. Song, “Pi: A path identification mechanism to defend against DDoS attacks,” in IEEE Symposium on Security and Privacy, May, 2003, p. 93.
- A. Yaar, A. Perrig, and D. Song, “Stackpi: new packet marking and filtering mechanisms for DDoS and IP spoofing defense,” IEEE J. Sel. Areas Commun., Vol. 24, no. 10, pp. 1853–1863, Oct. 2006. doi: https://doi.org/10.1109/JSAC.2006.877138
- CAIDA Macroscopie Internet Topology Data Kit (ITDK) #0304. Available: www.caida.org/datasets/topology/skitter/itdk/ITDK0304/LNK0304
- H. Wang, D. Zhang, and K. G. Shin, “Detecting SYN flooding attacks,” in Proceedings of IEEE INFOCOM’2002, June 2002, pp. 1530–1539.
- C. Jin, H. Wang, and K. G. Shin, “Hop-count filtering: an effective defense against spoofed DDoS traffic,” in Proceedings of the 10th ACM Conference on Computer and Communications Security, Oct. 2003, pp. 30–41.
- T. Peng, C. Leckie, and K. Ramamohanarao, “Proactively detecting distributed denial of service attacks using source IP address monitoring,” in International Conference on Research in Networking, Springer, Berlin, Heidelberg, May 2004, pp. 771–782.
- H. Rahmani, N. Sahli, and F. Kamoun, “DDos flooding attack detection scheme based on F-divergence,” Comput. Commun., Vol. 35, no. 11, pp. 1380–1391, June 2012. doi: https://doi.org/10.1016/j.comcom.2012.04.002
- Y. Xiang, K. Li, and W. Zhou, “Low-rate DDoS attacks detection and traceback by using new information metrics,” IEEE Trans. Inf. Forensics Secur., Vol. 6, no. 2, pp. 426–437, June 2011. doi: https://doi.org/10.1109/TIFS.2011.2107320
- R. Vijayasarathy, S. V. Raghavan, and B. Ravindran, “A system approach to network modeling for DDoS detection using a Naïve Bayesian classifier,” in Third International Conference on Communication Systems and Networks (COMSNETS), IEEE, Jan. 2011, pp. 1–10.
- A. Shevtekar, K. Anantharam, and N. Ansari, “Low rate TCP denial of-service attack detection at edge routers,” IEEE Commun. Lett., Vol. 9, no. 4, pp. 363–365, Apr. 2005. doi: https://doi.org/10.1109/LCOMM.2005.1413635
- A. Kuzmanovic and E. W. Knightly, “Low-rate TCP-targeted denial of service attacks: the shrew vs. the mice and elephants,” in Proceedings of the 2003 Conference on Applications, Technologies, Architectures and Protocols for Computer Communications, ACM, Aug. 2003, pp. 75–86.
- O. E. Elejla, M. Anbar, and B. Belaton, “ICMPv6-based DoS and DDoS attacks and defense mechanisms: review,” IETE Tech. Rev., Vol. 34, no. 4, pp. 390–407, July 2017. doi: https://doi.org/10.1080/02564602.2016.1192964
- T. Peng, C. Leckie, and K. Ramamohanarao, “Survey of network-based defense mechanisms countering the DoS and DDoS problems,” ACM Comput. Surv., Vol. 39, no. 1, pp. 3, Apr. 2007. Article 3. doi: https://doi.org/10.1145/1216370.1216373
- G. Carl, G. Kesidis, R. R. Brooks, and S. Rai, “Denial-of-service attack-detection techniques,” IEEE Internet Comput., Vol. 10, no. 1, pp. 82–89, Jan. 2006. doi: https://doi.org/10.1109/MIC.2006.5
- D. K. Bhattacharyya and J. K. Kalita. DDos Attacks: Evolution, Detection, Prevention, Reaction and Tolerance. Boca Raton: CRC Press, Taylor and Francis Group, May, 2016.
- N. Hoque, M. H. Bhuyan, R. C. Baishya, D. K. Bhattacharyya, and J. K. Kalita, “Network attacks: Taxonomy, tools and systems,” J. Netw. Comput. Appl., Vol. 1, no. 40, pp. 307–324, Apr. 2004.
- N. Hoque, D. K. Bhattacharyya, and J. K. Kalita, “Botnet in ddos attacks: trends and challenges,” IEEE Commun. Surv. Tutor., Vol. 17, no. 4, pp. 2242–2270, Jan. 2015. doi: https://doi.org/10.1109/COMST.2015.2457491
- S. T. Zargar, J. Joshi, and D. Tipper, “A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks,” IEEE Commun. Surv. Tutor., Vol. 15, no. 4, pp. 2046–2069, Nov. 2013. doi: https://doi.org/10.1109/SURV.2013.031413.00127