A. Foroushani and Z. H. , TDFA: Traceback-Based Defense against DDoS Flooding Attacks, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications, pp.710-715, 2014.
DOI : 10.1109/AINA.2014.73

J. B. Cabrera, L. Lewis, and X. Z. Qin, Proactive intrusion detection and distributed denial of service attacks-A case study in security management, Journal of Network and Systems Management, vol.10, issue.2, pp.225-254, 2002.
DOI : 10.1023/A:1015910917349

C. Chen and J. Park, Attack Diagnosis: Throttling distributed denial-of-service attacks close to the attack sources, Proc. of IEEE Int'l Conf. on Computer Communications and Networks, pp.275-280, 2005.

J. Francois and J. Aib, FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks, IEEE/ACM Transactions on Networking, vol.20, issue.6, pp.1828-1841, 2012.
DOI : 10.1109/TNET.2012.2194508

URL : https://hal.archives-ouvertes.fr/hal-00959439

T. M. Gil and T. Poletto, MULTOPS: A data-structure for bandwidth attack detection, Proc. of 10th conference on USENIX Security Symposium, 2001.
DOI : 10.21236/ADA401819

URL : http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA401819&Location=U2&doc=GetTRDoc.pdf

A. John and T. Sivakumar, DDoS: Survey of traceback methods, International Journal of Recent Trends in Engineering ACEEE, vol.1, issue.2, 2009.

R. Mahajan and S. M. Bellovin, Controlling high bandwidth aggregates in the network, ACM SIGCOMM Computer Communication Review, vol.32, issue.3, pp.62-73, 2002.
DOI : 10.1145/571697.571724

N. Mosharraf, A. Jayasumana, and I. Ray, A Responsive Defense Mechanism Against DDoS Attacks, Proc.7th of International Symposium on Foundations and Practice of Security, 2014.
DOI : 10.1007/978-3-319-17040-4_23

T. Peng, C. Leckie, and K. Ramamohanarao, Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring, Proc. of 3th International IFIP- TC6 Networking Conference, pp.771-782, 2004.
DOI : 10.1007/978-3-540-24693-0_63

URL : http://www.csse.unimelb.edu.au/~caleckie/networking04.pdf

T. Peng, C. Leckie, and K. Ramamohanarao, Survey of network-based defense mechanisms countering the DoS and DDoS problems, ACM Computing Surveys, vol.39, issue.1, pp.1-42, 2007.
DOI : 10.1145/1216370.1216373

I. Riorey, RioRey taxonomy of DDoS attacks, RioReyTaxono- myRev2.32012,2012.,[Online]Available:[online]http, 2009.

C. The and . Attack, Available: http:// www. Caida .org/data, Dataset, 2007.

Y. Yaar, A. Perrig, and D. Song, Pi: a path identification mechanism to defend against DDoS attacks, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405), 2003.
DOI : 10.1109/SECPRI.2003.1199330

URL : http://www.ece.cmu.edu/~adrian/projects/pi.ps

S. Zargar, J. Joshi, and D. Tipper, A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks, IEEE Communications Surveys & Tutorials, vol.15, issue.4, pp.2046-2069, 2013.
DOI : 10.1109/SURV.2013.031413.00127