TY - JOUR AU - Gao, Z. AU - Ansari, N. PY - 2005 DA - 2005// TI - Tracing cyber attacks from the practical perspective JO - IEEE Communications Magazine VL - 43 UR - https://doi.org/10.1109/MCOM.2005.1453433 DO - 10.1109/MCOM.2005.1453433 ID - Gao2005 ER - TY - CHAP AU - Subbulakshmi, T. AU - Guru, I. A. A. AU - Shalinie, S. M. PY - 2011 DA - 2011// TI - Attack source identification at router level in real time using marking algorithm deployed in programmable routers BT - International Conference on Recent Trends in Information Technology (ICRTIT), Chennai, 3–5 June 2011 UR - https://doi.org/10.1109/ICRTIT.2011.5972268 DO - 10.1109/ICRTIT.2011.5972268 ID - Subbulakshmi2011 ER - TY - CHAP AU - Matsuda, S. AU - Baba, T. AU - Hayakawa, A. AU - Nakamura, T. PY - 2002 DA - 2002// TI - Design and implementation of unauthorized access tracing system BT - Proceedings of the 2002 Symposium on Applications and the Internet UR - https://doi.org/10.1109/SAINT.2002.994453 DO - 10.1109/SAINT.2002.994453 ID - Matsuda2002 ER - TY - JOUR AU - Snoeren, A. C. AU - Partridge, C. AU - Sanchez, L. A. AU - Jones, C. E. AU - Tchakountio, F. AU - Schwartz, B. AU - Kent, S. T. AU - Strayer, W. T. PY - 2002 DA - 2002// TI - Single-packet IP traceback JO - IEEE/ACM Transactions on Networking VL - 10 UR - https://doi.org/10.1109/TNET.2002.804827 DO - 10.1109/TNET.2002.804827 ID - Snoeren2002 ER - TY - JOUR AU - Sung, M. AU - Li, J. AU - Xu, J. AU - Li, L. PY - 2008 DA - 2008// TI - Large-scale IP traceback in highspeed internet: practical techniques and theoretical foundation JO - IEEE/ACM Transactions on Networking VL - 16 UR - https://doi.org/10.1109/TNET.2007.911427 DO - 10.1109/TNET.2007.911427 ID - Sung2008 ER - TY - JOUR AU - Belenky, A. AU - Ansari, N. PY - 2003 DA - 2003// TI - On IP traceback JO - IEEE Communications Magazine VL - 41 UR - https://doi.org/10.1109/MCOM.2003.1215651 DO - 10.1109/MCOM.2003.1215651 ID - Belenky2003 ER - TY - CHAP AU - Bellovinm, S. PY - 2000 DA - 2000// BT - IETF Draft on ICMP traceback messages ID - Bellovinm2000 ER - TY - JOUR AU - Savage, S. AU - Wetherall, D. AU - Karlin, A. AU - Anderson, T. PY - 2001 DA - 2001// TI - Practical network support for IP traceback JO - IEEE/ACM Transactions on Networking VL - 9 UR - https://doi.org/10.1109/90.929847 DO - 10.1109/90.929847 ID - Savage2001 ER - TY - JOUR AU - Gao, Z. AU - Ansari, N. PY - 2007 DA - 2007// TI - A practical and robust inter-domain marking scheme for IP traceback JO - The International Journal of Computer and Telecommunications Networking VL - 51 ID - Gao2007 ER - TY - CHAP AU - Mankin, A. AU - Massey, D. AU - Wu, C. AU - Wu, S. F. AU - Zhang, L. PY - 2001 DA - 2001// TI - On design and evaluation of intention-driven, "Intention-Drive" ICMP Traceback BT - Tenth International Conference on Computer Communications and Networks ID - Mankin2001 ER - TY - JOUR AU - Savage, S. AU - Karlin, A. AU - Wetherall, D. AU - Anderson, T. PY - 2001 DA - 2001// TI - Network support for IP traceback JO - IEEE/ACM Transactions on Networking, VL - 9 UR - https://doi.org/10.1109/90.929847 DO - 10.1109/90.929847 ID - Savage2001 ER - TY - JOUR AU - Dean, D. AU - Franklin, M. AU - Stubblefield, A. PY - 2002 DA - 2002// TI - An algebraic approach to IP traceback JO - ACM Transactions on Information and System Security (TISSEC) VL - 5 UR - https://doi.org/10.1145/505586.505588 DO - 10.1145/505586.505588 ID - Dean2002 ER - TY - JOUR AU - Song, D. X. AU - Perrig, A. PY - 2001 DA - 2001// TI - Advanced and authenticated marking schemes for IP traceback JO - IEEE Computer and Communications INFOCOM VL - 2 ID - Song2001 ER - TY - CHAP AU - Doeppner, T. W. AU - Klein, P. AU - Koyfman, A. PY - 2000 DA - 2000// TI - Using router stamping to identify the source of IP packets BT - Proceedings of the 7th ACM Conference on Computer and Communications Security CCS ID - Doeppner2000 ER - TY - JOUR AU - Tseng, Y. AU - Chen, H. AU - Hsieh, W. PY - 2004 DA - 2004// TI - Probabilistic packet marking with non-preemptive compensation JO - IEEE Communications Letters VL - 8 UR - https://doi.org/10.1109/LCOMM.2004.831336 DO - 10.1109/LCOMM.2004.831336 ID - Tseng2004 ER - TY - CHAP AU - Yaar, A. AU - Perrig, A. AU - Song, D. PY - 2003 DA - 2003// TI - Pi: a path identification mechanism to defend against DDoS attacks BT - Proceedings of Symposium on Security and Privacy ID - Yaar2003 ER - TY - JOUR AU - Yaar, A. AU - Perrig, A. AU - Song, D. PY - 2005 DA - 2005// TI - FIT: fast Internet traceback JO - IEEE Computer and Communications INFOCOM VL - 2 ID - Yaar2005 ER - TY - CHAP AU - Goodrich, M. PY - 2002 DA - 2002// TI - Efficient packet marking for large-scale IP traceback BT - Proceedings of the 9th ACM conference on Computer and communications security ID - Goodrich2002 ER - TY - JOUR AU - Belenky, A. AU - Ansari, N. PY - 2003 DA - 2003// TI - IP traceback with deterministic packet marking JO - IEEE communication letters VL - 7 UR - https://doi.org/10.1109/LCOMM.2003.811200 DO - 10.1109/LCOMM.2003.811200 ID - Belenky2003 ER - TY - JOUR AU - Belenky, A. AU - Ansari, N. PY - 2007 DA - 2007// TI - On deterministic packet marking JO - The International Journal of Computer and Telecommunications Networking Computer Networks VL - 51 ID - Belenky2007 ER - TY - JOUR AU - Yang, M. PY - 2012 DA - 2012// TI - RIHT: a novel hybrid ip traceback scheme JO - IEEE Transactions on Information Forensics and Security VL - 7 UR - https://doi.org/10.1109/TIFS.2011.2169960 DO - 10.1109/TIFS.2011.2169960 ID - Yang2012 ER - TY - CHAP AU - Rayanchu, S. K. AU - Barua, G. PY - 2004 DA - 2004// TI - Tracing attackers with Deterministic Edge Router Marking (DERM) BT - Proceedings of the First international conference on Distributed Computing and Internet Technology ICDCIT UR - https://doi.org/10.1007/978-3-540-30555-2_47 DO - 10.1007/978-3-540-30555-2_47 ID - Rayanchu2004 ER - TY - CHAP AU - Moreira, M. D. D. AU - Fernandes, N. C. AU - Laufer, R. P. AU - Duarte, O. C. M. B. PY - 2011 DA - 2011// TI - A stateless traceback technique for identifying the origin of attacks from a single packet BT - IEEE International Conference on Communications (ICC) ID - Moreira2011 ER - TY - JOUR AU - Hongcheng, T. AU - Jun, B. PY - 2012 DA - 2012// TI - An incrementally deployable flow-based scheme for IP traceback JO - IEEE communication letters VL - 16 UR - https://doi.org/10.1109/LCOMM.2012.051512.120467 DO - 10.1109/LCOMM.2012.051512.120467 ID - Hongcheng2012 ER - TY - CHAP AU - Wang, X. AU - Wu, S. F. AU - Yuill, J. AU - Reeves, D. S. PY - 2001 DA - 2001// TI - Sleepy watermark tracing: an active network-based intrusion response framework BT - Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge ID - Wang2001 ER - TY - CHAP AU - Aghaei-Foroushani, V. AU - Zincir-Heywood, N. PY - 2013 DA - 2013// TI - Deterministic and authenticated flow marking for IP traceback BT - The 27th IEEE International Conference on Advanced Information Networking and Applications (AINA) ID - Aghaei-Foroushani2013 ER - TY - CHAP AU - Aghaei-Foroushani, V. AU - Zincir-Heywood, N. PY - 2013 DA - 2013// TI - On evaluating IP traceback schemes: a practical perspective BT - IEEE International Workshop on Cyber Crime (IWCC 2013) ID - Aghaei-Foroushani2013 ER - TY - STD TI - Burch H, Cheswick B: Tracing anonymous packets to their approximate source. Proceedings of the 14th USENIX Conference on System Administration LISA 319-327. ID - ref28 ER - TY - JOUR AU - Park, K. AU - Lee, H. PY - 2001 DA - 2001// TI - On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack JO - IEEE Computer and Communications INFOCOM VL - 1 ID - Park2001 ER - TY - STD TI - Wei D, Ansari N: Implementing IP traceback in the Internet: an ISP perspective. Proceedings of 3rd Annual IEEE Workshop on Information Assurance, (2002) 326-332. ID - ref30 ER - TY - JOUR AU - Shokri, R. AU - Mohammadi, H. AU - Yazdani, N. AU - Varshovi, A. AU - Sadeghian, B. PY - 2006 DA - 2006// TI - DDPM: dynamic deterministic packet marking for IP traceback JO - 14th IEEE International Conference on Networks ICON VL - 2 ID - Shokri2006 ER - TY - JOUR AU - Alshammari, R. AU - Zincir-Heywood, A. N. PY - 2011 DA - 2011// TI - Can encrypted traffic be identified without port numbers, IP addresses and payload inspection? JO - Elsevier Computer Networks VL - 55 UR - https://doi.org/10.1016/j.comnet.2010.12.002 DO - 10.1016/j.comnet.2010.12.002 ID - Alshammari2011 ER - TY - STD TI - DARPA 1999 intrusion detection data sets . Accessed 25 October 2013 http://www.ll.mit.edu/mission/communications/cyber/CSTcorpora/ideval/data/ UR - http://www.ll.mit.edu/mission/communications/cyber/CSTcorpora/ideval/data/ ID - ref33 ER - TY - STD TI - The CAIDA anonymized Internet traces 2012 dataset . Accessed 25 October 2013 http://www.caida.org/data/passive/{passive}_2012_dataset.xml UR - http://www.caida.org/data/passive/%7Bpassive%7D_2012_dataset.xml ID - ref34 ER - TY - STD TI - MAWI Working Group: MAWI (Measurement and Analysis on the WIDE Internet) traffic archive. . Accessed 25 October 2013 http://mawi.wide.ad.jp/mawi/ UR - http://mawi.wide.ad.jp/mawi/ ID - ref35 ER - TY - STD TI - Turner A: Tcpreplay suite. . Accessed 25 October 2013 http://tcpreplay.synfin.net/ UR - http://tcpreplay.synfin.net/ ID - ref36 ER - TY - STD TI - Riverbed Technology: Winpcap, The industry-standard windows packet capture library. . Accessed 25 October 2013 http://www.winpcap.org/ UR - http://www.winpcap.org/ ID - ref37 ER - TY - STD TI - Johnson D, Menezes A, Vanstone S: The Elliptic Curve Digital Signature Algorithm (ECDSA).. Accessed 25 October 2013 http://cs.ucsb.edu/~koc/ccs130h/notes/ecdsa-cert.pdf. Accessed 25 October 2013 UR - http://cs.ucsb.edu/~koc/ccs130h/notes/ecdsa-cert.pdf ID - ref38 ER - TY - STD TI - National Security Agency/CentralSecurityService(NSA/CSS): The case for Elliptic Curve Cryptography. . Accessed 25 October 2013 http://www.nsa.gov/business/programs/elliptic_curve.shtml UR - http://www.nsa.gov/business/programs/elliptic_curve.shtml ID - ref39 ER - TY - STD TI - Dai Wen: Crypto++ library of cryptographic schemes. . Accessed 25 October 2013 http://www.cryptopp.com/ UR - http://www.cryptopp.com/ ID - ref40 ER - TY - BOOK AU - Prasad, R. AU - Mihovska, A. PY - 2009 DA - 2009// TI - New Horizons in, Mobile and Wireless Communications: Networks, Services, and Applications PB - Artech House CY - London ID - Prasad2009 ER -