7Blackert, W. J. ; Gregg, D. M. ; Castner, A. K. ; Hom, R.L. ; Jokerst, R. M. ; Kyle, E. M. , Distributed denial of service defense attack tradeoff analysis (DDOSDATA) demonstration overview [A]. DARPA Information Survivability Conference and Exposition,2003 [C].Proceedings, Volume : 2,2003, Page (s) : 66- 67.
8Mirkovic, J. ; Prier, G. ; Reiher, P. , Attacking DDoS at the source, Network Protocols [A]. 2002. Proceedings.10th IEEE International Conference [C]. 2002, Page (s):312-321.
6GASTI P, TSUDIK G, UZUN E, et al. DoS and DDoS in named data networking [ J ]. International Conference on Computer Communications and Networks, 2013, 44 (3) : 1-7.
7ZARGAR S T, JOSHI J, TIPPER D. A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks[J]. Communications Surveys & Tutorials, 2013, 15(4) : 2046-2069.
8PENG T, LECKIE C, Ramamohanarao K. Survey of net- work -based defense mechanisms countering the DoS and DDoS problems [J] . ACM Computing Surveys, 2007, 39(1): 3.
9JEON D. Understanding DDoS attack, tools and free anti - tools with recommendation [ EB/OL ]. [ 2014 - 08 - 25 ] . http: //www. sans. org/infoseFAQ/threats/Under- stamding ddos. htm.
10ISOZAKI H, ATA S, OKA I, et al. Performance im- provement on probabilistic packet marking by using history caching [ C ] //APSITr' OS Information and Telecommu- nication Technologies, 2005.6th Asia - Pacific Sympo sium, Piscafauany, N. J: IEEE Press, 2005:381-386.