1Peng T.Deteeting reflector attacks by sharing beliefs[J].IEEE Global Telecommunication Conference,2003,46 : 1358-1362.
2Jill C,Wang H, Shin K, et aLAn effective defense against spoofed traftic[C]//ACM International Conference on Computer and Communications Conference Security,2003,10: 30-41.
3Noureldien N A, Osman I M.A stateful inspection module archi- tecture[C]//IEEE/RENCON, 2000,2 : 259-265.
4Tsunoda H,Ohta K,Yamamoto A,et al.Detecting DRDoS attacks by a simple response packet confirmation mechanism[J].Computer Communications, 2008 : 3299-3306.
5Shi Yi, Yang Xinyu, Zhu Huijun.A Flooding-based DoS/DDoS detecting algorithm based on traffic measurement and prediction[Z]. 2006.