5sAVAGE S,WETHERALL D,KARLIN A,et al.Network support for IP traceback[J].IEEE Trans on Networking,2001,1(3):226-237.
6QIU Xiao-feng,HAO Ji-hong,CHEN Ming.A mechanism to defend SYN flooding attack based on network measurement systemiC].London:IEEE In-ternational Conference on Information Technology,Research and Education(ITRE)2004,2004.
7WEAVER N,PAXSON V,STANIFORD S,et al.A taxonomy of computer worms[C].Washington:ACM CCS Workshop on Rapid Malcode(WORM),2003.