1[1]Computer Security Institute and Federal Bureau of Investigation. 1999CSI/FBI Computer Crime and Security Survey. Computer Security Institute publication, 1999-03
2[2]Sven Dietrich,Neil Long,David Dittrich. Analyzing distributed denial of service attack tools:The shaft case[C].In:14th Systems Administration Conference,LISA 2000,2000
3[3]Anu ramanthan. WADeS:A tool for DDoS detection[D].A thesis of master. Texas A&M Univ,2002
4[4]Haining Wang,Danlu Zhang ,Kang G Shin.Detecting SYN Flooding Attacks[C].In:Proceedings of IEEE INFOCOM′2002,2002
5[5]Jianxin Yan,Stephen Early.The XenoService :A Distributed Defeat for Distributed Denial of Service[C].In:Proceedings of ISW 2000,2000
6[6]Kyoungwon Suh,Thu D Nguyen. A Practical Defense Against SYN Denial of Service Attacks[G].In:IEEE INFOCOM 2002,2002
7[7]S Savage,D Wetherall,A Karlin et al. Network Support for IP Traceback[J].IEEE/ACM Transactions on Networking,2001;9(3)
8[8]Alex C Snoeren,Craig Partridge,Luis A Sanchez et al. Hash-Based IP TraceBack[C].In:Proc ACM SIGCOMM Conf,2001-08
9[9]Drew Dean,Matt Franllin,Adam Stubblefield.An Algebraic Approach for IP TraceBack[C].In:Proc 2001 Network and Distributed System Security Symp,2001-02
10[10]E Ferguson, D Senie. Network ingress filtering: Defeating denial-ofservice attacks which employ IP source address spoofing[S].RFC 2827,2000