4Lee S C, Shields C. Tracing the Source of Network Attack: A Technical, Legal and Societal Problem[C]//Proceedings of the 2001 IEEE, Workshop on Information Assurance and Security, NY United States Military Academy, West Point, 2001:5-6.
5StefanSavage, DavidWetherall, AnnaKarlin, et al. Practical Network Support for IP Traceback[D]. WA, USA:Department of Computer Science and Engineering University of Washington Seattle. 2000.
6Vadim Kuznetsov. Andrei Simkin. Helena Sandstrom. An evaluation of different IP traceback approaches[D]. Sweden Department of Computer Science and Electrical Engineering Lulea University of Technology, SE-971 87 Lulea, 2003.
7Andreou M S, van Moorsel. Logging Switched Ethernets[D]. UK:School Based IP Traceback in of Computing Science Newcastle University Newcastle upon Tyne, 2006.
8Snoerent A C, Partridge C, Sanchez L A, et al. Hash-Based IP Traceback[D]. Cambridge, BBN Technologies10 Moulton Street 2001.
9Song D X, Perrig A. Advanced and Authenticated Marking Schemes for IP Traceback[D]. California: Computer Science Division (EECS)University of California Berkeley, 2000.
10Belenky A, Ansari N. Internet Deployment of DPM-based IP Traceback[J]. Journal of Computing and Information Technology-CIT 16, 2008(02): 109-118.