[16] |
WANG H N , ZHANG D L , SHIN K G . Detecting SYN flooding attacks[A]. Twenty-First Annual Joint Conference of the IEEE Com-puter and Communications Societies[C]. New York, NY, USA, 2002.1530-1539.
|
[17] |
EHRLICH W K , FUTAMURA K , LIU D . An Entropy Based Method to Detect Spoofed Denial of Service (DoS) Attacks[M]. US: Springer US, 2008,44:101-122.
|
[1] |
Prolexic Quarterly Global DDoS Attack Report Q4 2012[R]. Holly-wood: Prolexic Technologies, 2013.
|
[2] |
KLEYMAN B . Why Anti-DDoS Products and Services are Critical for Today's Business Environment[R]. Data Center Knowledge (DCK), 2013.
|
[3] |
2012年我国互联网网络安全态势综述[R]. 北京: 国家互联网应急中心, 2013.2012 Survey on Internet Security Situation in China[R]. Beijing: Na-tional Computer Network Emergency Response Technical Team/Co-ordination Center, 2013.
|
[4] |
What is asymmetric routing[EB/OL]. , 2013.
|
[5] |
EDDY W . TCP SYN flooding attacks and common mitigations[EB/OL]. , 2007.
|
[6] |
BERNSTEIN D J . SYN cookies[EB/OL]. .
|
[7] |
ZúQUETE A . Improving the functionality of syn cookies[J]. Ad-vanced Communications and Multimedia Security, 2002,(100):57-77.
|
[8] |
HANG B , HU R M , SHI W . An enhanced SYN cookie defence method for TCP DDoS attack[J]. Journal of Networks, 2011,8(6):1206-1213.
|
[9] |
JONATHAN L . Resisting SYN flood DoS attacks with a SYN cache[A]. Proceedings of the BSD Conference 2002 on BSD Confer-ence[C]. CA, USA, 2002.89-97.
|
[10] |
WU Z , CHEN Z . A three-layer defense mechanism based on web servers against distributed denial of service attacks[A]. Proceedings of the First International Conference on Communications and Network-ing[C]. Beijing, China, 2006.1-5.
|
[11] |
SCHUBA C L , KRSUL I V , KUHN M G . Analysis of a denial of service attack on TCP[A]. Proceedings of 1997 IEEE Symposium on Security and Privacy[C]. Oakland, CA, USA, 1997.208-223.
|
[12] |
WANG H N , ZHANG D L , SHIN K G . SYN-dog: sniffing SYN flood-ing sources[A]. Proceedings of the 22′nd International Conference on Distributed Computing Systems (ICDCS'02)[C]. Vienna, Austria, 2002.421-428.
|
[13] |
NAKASHIMA T , OSHIMA S . A detective method for SYN flood attacks[A]. Proceedings of the First International Conference on Inno-vative Computing, Information and Control (ICICIC'06)[C]. Wash-ington DC, USA, 2006.48-51.
|
[14] |
CHEN W , YEUNG D . Defending against TCP SYN flooding attacks under different types of IP spoofing[A]. Proceedings of the Interna-tional Conference on Networking, International Conference on Sys-tems and International Conference on Mobile Communications and Learning Technologies[C]. Mauritius, 2006.38-43.
|
[15] |
SUN C H , HU C C , TANG Y , et al. More accurate and fast SYN flood detection[A]. Proceedings of 18th Internatonal Conference on Computer Communications and Networks[C]. San Francisco, CA, USA, 2009.1-6.
|