P. Ferguson and D. Senie, Network ingress filtering: Defeating denial-of-service attacks which employ IP source address spoofing, RFC 2827, 2000.

J. Ioannidis and S. M. Bellovin, Implementing Pushback: Router-Based Defense Against DDoS Attacks, Proc. Network and Distributed System Security Symposium, 2002.

Y. Kim, W. Lau, M. Chuah, and J. Chao, PacketScore: A statistical-based overload control against DDoS attacks, Proc. IEEE INFOCOM, 2004.

J. Mirkovic and D. , Source-End Defense against Distributed Denial-of-Service Attacks, 2003.

J. Mirkovic and P. Reiher, A taxonomy of DDoS attack and DDoS defense mechanisms, ACM SIGCOMM Computer Communication Review, vol.34, issue.2, pp.39-53, 2004.
DOI : 10.1145/997150.997156

V. Paxson, End-to-end routing behavior in the Internet Conference proceedings on Applications, technologies, architectures, and protocols for computer communications, pp.25-38, 1996.

T. Peng, C. Leckie, and K. Ramamohanarao, Protection from Distributed Denial of Service Attack Using History-based IP Filtering, Proc. of IEEE ICC 2003, 2003.

H. Wang, C. Jin, and K. G. Shin, Defense Against Spoofed IP Traffic Using Hop-Count Filtering, IEEE/ACM Transactions on Networking, vol.15, issue.1, pp.40-53, 2007.
DOI : 10.1109/TNET.2006.890133

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

A. Yaar, D. Perrig, and . Song, SIFF: a stateless internet flow filter to mitigate DDoS flooding attacks, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 2004.
DOI : 10.1109/SECPRI.2004.1301320

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

A. Yaar, A. Perrig, and D. Song, Pi: a path identification mechanism to defend against DDoS attacks, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405), pp.93-107, 2003.
DOI : 10.1109/SECPRI.2003.1199330