[1] |
Caida spoofer program report[R]. 2019.
|
[2] |
ENGLEHARDT S , NARAYANAN A . Online tracking:a 1-million-site measurement and analysis[C]// the 2016 ACM SIGSAC Conference on Computer and Communications Security,Oct 12-16,2015,Denver,Colorado,USA. New York:ACM Press, 2016: 1388-1401.
|
[3] |
FERGUSON P , SENIE D . Network ingress filtering:defeating denial of service attacks which employ IP source address spoofing:RFC 2827[S]. 2000.
|
[4] |
DUAN Z , ·UAN X , CHANDRASHEKAR J . Constructing interdomain packet filters to control IP spoofing based on BGP updates[C]// INFOCOM,April 23-29,2006,Barcelona,Spain. Piscataway:IEEE Press, 2006.
|
[5] |
BREMLER-BARR A , LEVY H . Spoofing prevention method[C]// IEEE INFOCOM, 2005(1): 536-547.
|
[6] |
JIN C , WANG H , SHIN K . Hop-count filtering:an effective defense against spoofed DDoS traffic[C]// the 10th ACM Conference on Computer and Communications Security,Oct 27 - 30,Washington D.C.,USA. New York:IEEE Press, 2003.
|
[7] |
BAKER F , SAVOLA P . Ingress filtering for multihomed networks:RFC 3704[S]. 2004.
|
[8] |
BI J , LIU B . Problem statement of SAVI beyond the first hop,Internet Draft[R]. 2012.
|
[9] |
LIU X , ·ANG X , WETHERALL D ,et al. Efficient and secure source authentication with packet passports[C]// 2nd conference on Steps to Reducing Unwanted Traffic on the Internet,San Jose,CA,USA. New York:ACM Press, 2006.
|
[10] |
LIU X , ·ANG X , WETHERALL D ,et al. Passport:secure and adoptable source authentication[C]// 5th USENIX NSDI,April16-18,2008,San Francisco,California,USA. New York:ACM Press, 2008.
|
[11] |
RAGHAVAN B , KOHNO T , SNOEREN A C ,et al. Enlisting ISP to improve online privacy:IP address mixing by default[C]// PETS '09,August 5-7,2009,Seattle,WA,USA. New York:ACM Press, 2009.
|
[12] |
CHAUM D . Untraceable electronic mail,return address,and digital pseudonyms[J]. Communications of the ACM, 1981,24(2): 84-88.
|
[13] |
DINGLEDINE R , MATHEWSON N , SYVERSON P F . Tor:the second-generation onion router[J]. Journal of the Franklin Institute, 2004,239(2): 135-139.
|
[14] |
NARTEN T , DRAVES R , KRISHNAN S . Report from the IAB workshop on routing and addressing:RFC4941[S]. 2007.
|
[15] |
GONT F . Method for generating semantically opaque interface identifiers with ipv6 stateless address autoconfiguration (slaac),RFC 7217,Internet engineering task force,request for comments[S]. 2014.
|
[16] |
ANDERSEN D G , BALAKRISHNAN H , FEAMSTER N ,et al. Accountable internet protocol[C]// ACM SIGCOMM 2008 Conference on Applications,Technologies,Architectures,and Protocols for Computer Communications,August 17-22,2008,Seattle,WA,USA. New York:ACM Press, 2008.
|
[17] |
NAYLOR D , MUKERJEE M K , STEENKISTE P.Balancing accountability and privacy in the network . [J]. ACM Sigcomm Computer Communication Review, 2014,44(4).
|
[18] |
LEE T , PAPPAS C , BARRERA D ,et al. Source accountability with domain-brokered privacy[C]// the 12th International on Conference on emerging Networking Experiments and Technologies,December 12 - 15.2016,Irvine,California,USA. New York:ACM Press, 2016.
|
[19] |
US service provider survives the biggest recorded DDoS in history[Z]. 2018.
|
[20] |
ANTONAKAKIS M , APRIL · , BAILEY M ,et al. Understanding the mirai botnet[C]// 26th USENIX Security.[S.l.:s.n]. 2017.
|
[21] |
CloudFlare. Advanced DDoS attack protection[Z]. 2018.
|
[22] |
FAYAZ S K , TOBIOKA · , SEKAR V ,et al. Bohatei:flexible and elastic DDoS defense[C]// Usenix Conference on Security Symposium,August 12 - 14,2015,Washington,D.C.,USA. New York:ACM Press, 2015.
|
[23] |
BASESCU C , REISCHUK R M , SZALACHOWSKI P ,et al. SIBRA:Scalable internet bandwidth reservation architecture[J]. arXiv preprint arXiv:1510.02696, 2015.
|
[24] |
李子姝, 谢人超, 孙礼 ,等. 移动边缘计算综述[J]. 电信科学, 2018,34(1): 87-101.
|
|
LI Z S , XIE R C , SUN L ,et al. A survey of mobile edge computing[J]. Telecommunications Science, 2018,34(1): 87-101.
|