3McConnell M, Hamilton A.Information assurance in the twenty-first century [EB/OL].http://www.computer.org/security/supplement1/mcc, 2004-04-15.
4Morris R T.A weakness in the 4.2BSD UNIX TCP/IP software [R].New Jersey: American Telephone and Telegraph Company Bell Laboratories, 1985.
5Lee S C, Shields C.Tracing the source of network attack: A technical legal and societal problem [A].Proceedings of the 2001 IEEE Workshop on Information Assurance and Security [C].Oakland: IEEE Computer Society Press, 2001.239-246.
6Savage S, Wetherall D, Karlin A, et al.Network support for IP traceback [J].IEEE/ACM Transactions on Network, 2001, 9(3):226-237.
7Dean D, Franklin M, Stubblefield A.An algebraic approach to IP traceback [J].ACM Transactions on Information and System Security, 2002, 5(2):119 -137.