1 Michalis Faloutsos, "“On power-law relationships of the internet topology" 251-262, 1999
2 Stefan Savage, "ractical network support for IP traceback"
3 Laura Feinstein, "Statistical Approaches to DDoS Attack Detection and Response" 303-, 2003
4 "Spread Toolkit"
5 Stefan Savage, "Practical network support for IP traceback" 295-306, 2000
6 M. E. J. Newman, "Power laws, Pareto distri- butions and Zipf's law" 46 : 323-351, 2005
7 "Linux Advanced Routing and Traffic Control HOWTO"
8 Dan Schnackenberg, "Infrastructure for Intrusion Detection and Response," 2000
9 Steven Bellovin, "ICMP traceback messages"
10 Haining Wang, "Detecting SYN flooding attacks"
1 Michalis Faloutsos, "“On power-law relationships of the internet topology" 251-262, 1999
2 Stefan Savage, "ractical network support for IP traceback"
3 Laura Feinstein, "Statistical Approaches to DDoS Attack Detection and Response" 303-, 2003
4 "Spread Toolkit"
5 Stefan Savage, "Practical network support for IP traceback" 295-306, 2000
6 M. E. J. Newman, "Power laws, Pareto distri- butions and Zipf's law" 46 : 323-351, 2005
7 "Linux Advanced Routing and Traffic Control HOWTO"
8 Dan Schnackenberg, "Infrastructure for Intrusion Detection and Response," 2000
9 Steven Bellovin, "ICMP traceback messages"
10 Haining Wang, "Detecting SYN flooding attacks"
11 Dan Schnackenberg, "Cooperative Intrusion Traceback and Response Architecture (CITRA)" 2001
12 Ratul Mahajan, "Controlling high bandwidth aggregates in the network" 2001
13 Ratul Mahajan, "Controlling high bandwidth aggregates in the network" 2001
14 Robert Stone, "Centertrack: An IP overlay network for tracking DoS floods" 199-212, 2000
15 Dan Stenrne, "Active Network Based DDoS Defense" 193-, 2002
16 David L. Tennenhouse, "A Survey of Active Network Research" 1997
17 Peter Mell, ""An Overview of Issues in Testing Intrusion Detection Systems" NIST Interagency Reprots" 2003