1Howard F Lipson.Tracking and Tracing Cyber-Attacks:Technical Challenges and Global Poli-cy Issues[].CERT(r)Coordination Center.2002
2Heejin Jang,Sangwook Kim.Intruder trac-ing through dynamic extension of a security domain,Department of Computer Science Kyungpook Na-tional University,Korea[].Journal of Network and Computer Applications.2002
3Debar,H,Huang M,and Donahoo D.Intrusion Detection Exchange Format Data Model[].draft-ietf-idwg-data-model-txt.2000
4Dawn Xiaodong Song,Adrian Perrig.Ad-vanced and Authenticated Marking Schemes for IP Traceback[].Computer Science Department University ofCalifornia.2001