6DIETRICH S, LONG N, DITTRICH D. Analyzing distributed denial of service tools: the shaft case [ C ]//Proc of the 14th USENIX Conference on System Administration. Berkeley, CA: USENIX Association, 2000:329-340.
7TEMPLETON S J, LEVITT K E. Detecting spoofed packets [ C ]// Proc of the 3rd DARPA Information Survivability Conf and Expo( DISCEX Ⅲ ). New York: IEEE Press, 2003 : 164-175.
8WANG Hai-ning, JIN Cheng, SHIN K G. Defense against spoofed IP traffic using hop-count filtering[ J]. IEEE/ACM Trans on Networking, 2000,15( 1 ) :40-53.
9XIE Gao-gang, ZHANG Guang-xing, YANG Jian-hua, et al. Survey on traffic of metro area network with measurement on-line [ C ]//Proc of the 20th International Teletraffic Congress. Berlin: Springer-Verlag, 2007:666-677.
10ZHANG Guang-xing, XIE Gao-gang, YANG Jian- hua, et al. Self- similar characteristic of traffic in current metro area network [ C ]// Proc of the 15th IEEE Workshop on Local & Metropolitan Area Net- works. Princeton, NJ: [s. n. ], 2007:176-181.