Network ingress filtering: Defeating denial-of-service attacks which employ IP source address spoofing, RFC 2827, 2000. ,
Implementing Pushback: Router-Based Defense Against DDoS Attacks, Proc. Network and Distributed System Security Symposium, 2002. ,
PacketScore: A statistical-based overload control against DDoS attacks, Proc. IEEE INFOCOM, 2004. ,
Source-End Defense against Distributed Denial-of-Service Attacks, 2003. ,
A taxonomy of DDoS attack and DDoS defense mechanisms, ACM SIGCOMM Computer Communication Review, vol.34, issue.2, pp.39-53, 2004. ,
DOI : 10.1145/997150.997156
End-to-end routing behavior in the Internet Conference proceedings on Applications, technologies, architectures, and protocols for computer communications, pp.25-38, 1996. ,
Protection from Distributed Denial of Service Attack Using History-based IP Filtering, Proc. of IEEE ICC 2003, 2003. ,
Defense Against Spoofed IP Traffic Using Hop-Count Filtering, IEEE/ACM Transactions on Networking, vol.15, issue.1, pp.40-53, 2007. ,
DOI : 10.1109/TNET.2006.890133
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.104.7433
SIFF: a stateless internet flow filter to mitigate DDoS flooding attacks, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 2004. ,
DOI : 10.1109/SECPRI.2004.1301320
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.6.3184
Pi: a path identification mechanism to defend against DDoS attacks, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405), pp.93-107, 2003. ,
DOI : 10.1109/SECPRI.2003.1199330