1Wagner A,Plattner B. Peer-to-Peer Systems as Attack Platform for Distributed Denial-of-Service. (2002-12-10), http://www.fik,ee. ethz.eh/-ddosvax/publications/papers/sact2002,pdf.
2MIRKOVIC J, DIETRICH S, DITTRICH D, et al. Internet denial of service : attack and defense mechanisms [M]. [S. l.]: Prentice Hall PTR,2004.
3PAXSON V. An analysis of using reflectors for distributed denial-of- service attacks [J]. ACM SIGCOMM Computer Communication Review,2001,31 (3) :38-47.
4DASWANI N, GARCIA-MOLINA H. Query-flood DoS attacks in Gnutella networks [C]//Proc of ACM Conference on Computer and Communications Security. 2002.
5LIOGKAS N, NELSON R, KOHLER E, et al. Exploiting BitTorrent for fun (but not profit) [C]//Proc of International Workshop on Peer- to-Peer Systems (IPTPS). 2006.
6DUMITRIU D, KNIGHTLY E, KUZMANOVIC,et al. DeniM-of-service resilience in peer-to-peer file-sharing systems[C]//Proc of ACM SIGMETRICS. 2005.
7WALSH K, SIRER E. Fighting peer-to-peer SPAM and decoys with object reputation[C]//Proc of P2PECON Workshop. 2005.
8SIT E, MORRIS R. Security considerations for peer-to-peer distributed hash tables[C]//Proc of the 1st International Workshop on Peer-to-Peer Systems. 2002.
9CASTRO M, DRUSCHEL P, GANESH A, et al. Security for structured peer-to-peer overlay networks [C]//Proc of OSDI 2002. 2002.
10WALLACH D. A survey of peer-to-peer security issues[C]//Proc of International Symposium on Software Security. 2002.