[1]Snoeren A, Partridge Craig, Sanchez L, et al. Single packet IP traceback[J]. IEEE/ACM Transactions on Networking, 2002, 10(6):721-734.
[2]
[2]Gong Chao, Sarac Kamil. A more practical approach for single packet IP traceback using packet logging and marking[J]. IEEE Transactions on Parallel and Distributed Systems, 2008, 19(10):1310-1324.
[3]
[3]Savage S, Wetherall D, Karlin A, et al. Network support for IP traceback[J]. IEEE/ACM Transactions on Networking, 2001, 9(3):226-237.
[4]
[4]Gong Chao, Sarac Kamil. Toward a practical packet marking approach for IP traceback[J]. International Journal of Network Security, 2009, 8(3):271-281.
[5]
[5]Arbor Networks Inc. 2010 Worldwide infrastructure security report [EB/OL]. Chelmsford, Massachusetts: Arbor Networks Inc. (2010/09/16)[2011/11/15].
[6]
[6]Stoica I, Zhang H. Providing guaranteed services without per flow management[C]∥ ACM SIGCOMM 1999. Cambridge:ACM, 1999:81-94.
[7]
[7]Xiang Yang, Zhou Wanlei, Guo Minyi. Flexible deterministic packet marking: an IP traceback system to find the real source of attacks [J]. IEEE Transacions on Parallel and Distributed Systems, 2009, 20(4):567-580.
[8]
[8]Theilmann W, Rothermel K. Dynamic distance maps of the Internet[C]∥ IEEE INFOCOM 2000. Tel Aviv:IEEE, 2000:275-284.