TDFA: Traceback-Based Defense against DDoS Flooding Attacks, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications, pp.710-715, 2014. ,
DOI : 10.1109/AINA.2014.73
Proactive intrusion detection and distributed denial of service attacks-A case study in security management, Journal of Network and Systems Management, vol.10, issue.2, pp.225-254, 2002. ,
DOI : 10.1023/A:1015910917349
Attack Diagnosis: Throttling distributed denial-of-service attacks close to the attack sources, Proc. of IEEE Int'l Conf. on Computer Communications and Networks, pp.275-280, 2005. ,
FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks, IEEE/ACM Transactions on Networking, vol.20, issue.6, pp.1828-1841, 2012. ,
DOI : 10.1109/TNET.2012.2194508
URL : https://hal.archives-ouvertes.fr/hal-00959439
MULTOPS: A data-structure for bandwidth attack detection, Proc. of 10th conference on USENIX Security Symposium, 2001. ,
DOI : 10.21236/ADA401819
URL : http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA401819&Location=U2&doc=GetTRDoc.pdf
DDoS: Survey of traceback methods, International Journal of Recent Trends in Engineering ACEEE, vol.1, issue.2, 2009. ,
Controlling high bandwidth aggregates in the network, ACM SIGCOMM Computer Communication Review, vol.32, issue.3, pp.62-73, 2002. ,
DOI : 10.1145/571697.571724
A Responsive Defense Mechanism Against DDoS Attacks, Proc.7th of International Symposium on Foundations and Practice of Security, 2014. ,
DOI : 10.1007/978-3-319-17040-4_23
Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring, Proc. of 3th International IFIP- TC6 Networking Conference, pp.771-782, 2004. ,
DOI : 10.1007/978-3-540-24693-0_63
URL : http://www.csse.unimelb.edu.au/~caleckie/networking04.pdf
Survey of network-based defense mechanisms countering the DoS and DDoS problems, ACM Computing Surveys, vol.39, issue.1, pp.1-42, 2007. ,
DOI : 10.1145/1216370.1216373
RioRey taxonomy of DDoS attacks, RioReyTaxono- myRev2.32012,2012.,[Online]Available:[online]http, 2009. ,
Available: http:// www. Caida .org/data, Dataset, 2007. ,
Pi: a path identification mechanism to defend against DDoS attacks, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405), 2003. ,
DOI : 10.1109/SECPRI.2003.1199330
URL : http://www.ece.cmu.edu/~adrian/projects/pi.ps
A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks, IEEE Communications Surveys & Tutorials, vol.15, issue.4, pp.2046-2069, 2013. ,
DOI : 10.1109/SURV.2013.031413.00127