A. Belenky and N. Ansari, IP traceback with deterministic packet marking, IEEE Communications Letters, vol.7, issue.4, pp.162-164, 2003.
DOI : 10.1109/LCOMM.2003.811200

A. Bremler-barr and H. Levy, Spoofing prevention method, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies., 2005.
DOI : 10.1109/INFCOM.2005.1497921

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.128.3616

A. M. Dan, /. Usc, D. M. Isi, S. Felix, W. Ucdavis et al., On Design and Evaluation of " Intention-Driven " ICMP Traceback, Proceedings of IEEE ICCCN, 2001.

P. Ferguson and D. Senie, Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing, p.2827, 2000.

C. Jin, H. Wang, and K. G. Shin, Hop-count filtering, Proceedings of the 10th ACM conference on Computer and communication security , CCS '03, 2003.
DOI : 10.1145/948109.948116

J. Li, J. Mirkovic, T. Ehrenkranz, M. Wang, P. Reiher et al., Learning the valid incoming direction of IP packets, Computer Networks, vol.52, issue.2, pp.399-417, 2008.
DOI : 10.1016/j.comnet.2007.09.024

T. Peng, C. Leckie, and K. Ramamohanarao, Adjusted Probabilistic Packet Marking for IP Traceback, NETWORKING 2002, pp.697-708
DOI : 10.1007/3-540-47906-6_56

T. Peng, C. Leckie, and K. Ramamohanarao, Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring, Proceedings of the Third International IFIP-TC6 Networking Conference, pp.771-782, 2002.
DOI : 10.1007/978-3-540-24693-0_63

S. Savage, D. Wetherall, A. Karlin, and T. Anderson, Practical network support for IP traceback, ACM SIGCOMM Computer Communication Review, vol.30, issue.4, pp.295-306, 2000.
DOI : 10.1145/347057.347560

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.3372

Y. Shen, J. Bi, J. Wu, and Q. Liu, A two-level source address spoofing prevention based on automatic signature and verification mechanism, Computers and Communications, pp.392-397, 2008.

D. X. Song and A. Perrig, Advanced and authenticated marking schemes for IP traceback, Proceedings of INFOCOM 2001, 2001.

W. T. Strayer, C. E. Jones, F. Tchakountio, and R. R. Hain, SPIE-IPv6: single IPv6 packet traceback, 29th Annual IEEE International Conference on Local Computer Networks, 2004.
DOI : 10.1109/LCN.2004.118

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.218.7481

C. Systems, NetFlow Services Solutions Guide, 2007.

T. Cymru-inc, The bogon reference, 2012.

H. Wang, C. Jin, and K. G. Shin, Defense Against Spoofed IP Traffic Using Hop-Count Filtering, IEEE/ACM Transactions on Networking, vol.15, issue.1, 2007.
DOI : 10.1109/TNET.2006.890133

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.104.7433

R. Wanner, Session Hijacking in Windows Networks, SANS Inst, 2006.

L. Xie, J. Bi, and J. Wu, An Authentication Based Source Address Spoofing Prevention Method Deployed in IPv6 Edge Network, Proceedings of ICCS 2007, 2007.
DOI : 10.1007/978-3-540-72590-9_121

A. Zuquete, Improving the Functionality of SYN Cookies, Proc. of IFIP TC6/TC11 Communications and Multimedia Security, pp.57-77, 2002.
DOI : 10.1007/978-0-387-35612-9_6