[1] |
MARIOS A , GEORGIOS K , PANAGIOTIS K ,et al. DNS amplification attack revisited[J]. Computers & Security, 2013,39: 475-485.
|
[2] |
Arbor Networks. 2012 infrastructure security report[EB/OL]. .
|
[3] |
CHEUNG S . Denial of service against the domain name system[J]. IEEE Security and Privacy, 2006,4(1): 40-45.
|
[4] |
孙红杰, 方滨兴, 张宏莉 . 基于链路特征的 DDoS 攻击检测方法[J]. 通信学报, 2007,28(2): 88-93. SUN H J , FANG B X , ZHANG H L . DDoS attacks detection based on link character[J]. Journal on Communications, 2007,28(2): 88-93.
|
[5] |
GEORGIOS K , TASSOS M , DIMITRIS G ,et al. A fair solution to DNS amplification attacks[A]. Proceedings-2nd International Annual Workshop on Digital Forensics and Incident Analysis[C]. 2007. 38-47.
|
[6] |
MOCKAPETRIS P . Domain names-concepts and facilities[EB/OL]. .
|
[7] |
MOCKAPETRIS P Domain names-implementation and specification[EB/OL]. .
|
[8] |
CHANG Y H , YOON K B , PARK D W . A study on the IP spoofing attack through proxy server and defence thereof[A]. 2013 International Conference on Information Science and Applications[C]. 2013.
|
[9] |
FERGUSON P . FERGUSON P.Network ingress filtering:defeating denial of service attacks which employ IP source address spoofing[EB/OL]. .
|
[10] |
GHOSH A , WONG L , CRESCENZO G D ,et al. Infilter:predictive ingress filtering to detect spoofed IP traffic[A]. Proceedings of the 25th IEEE International Conference on Distributed Computing Systems Workshops[C]. 2005.
|
[11] |
HAINING W , CHENG J , KANG G S . Defense against spoofed IP traffic using hop-count filtering[J]. IEEE/ACM Transactions on Networking, 2007,15(1): 40-53.
|
[12] |
ZHEN H , XIN Y , JAIDEEP C . Controlling IP spoofing throughinterdomain packet filters[J]. IEEE Transactions on Dependable and Secure Computing, 2008,5(1): 22-36.
|
[13] |
CHANGHUA S , BIN L , LEI S . Efficient and low-cost hardware defense against DNS amplification attacks[A]. 2008 IEEE Global Telecommunications Conference,GLOBECOM[C]. 2008. 2062-2066.
|
[14] |
DESHPANDE T , KATSAROS P , BASAGIANNIS S ,et al. Formal analysis of the DNS Bandwidth amplification attack and its countermeasures using probabilistic model checking[A]. Proceedings of IEEE International Symposium on High Assurance Systems Engineering[C]. 2011. 360-367.
|