[1]
|
“WikiLeaks Supporters Tear down VISA in DDoS Attack,” December 9, 2010. http://www.digitaltrends.com/ computing/wikileaks-supporters-tear-down-visa-in-ddos- attack/.
|
[2]
|
Cnet news, “Twitter Crippled by Denial-of-Service Attack”, 15 October 2010. http://news.cnet.com/8301-1357 7_3-10304633-36. html
|
[3]
|
R. Richardson, “2008 CSI Computer Crime & Security Survey,” CSI, 2008.
|
[4]
|
“US Suspects N Korea Launched Internet Attack on July 4,” 15 October 2010. http://ibnlive.in.com/news/us-suspects-n-korea-laun-ched-internettack-on-%20%20%20% 20%20july-4/96715 -2.html
|
[5]
|
“Computer Emergency Response Team (CERT)? Advisory CA-2001-20,” 15 October 2010. http://www.cert. org/tech_tips/home_ networks.html
|
[6]
|
“Computer Emergency Response Team (CERT)?,” Trends in Denial of Service Attacks Technology. 15 October 2010. http:// www.cert.org/archive/pdf/DoS_trends. pdf
|
[7]
|
C. Douligeris and A. Mitrokotsa, “DDOS Attacks and Defense Mechanisms: A Classification,” Proceedings of the 3rd IEEE International Symposium on Signal Processing and Information Technology, Darmstadt,14-17 December 2003, pp. 190-193. doi:10.1109/ISSPIT.2003.1341092
|
[8]
|
J. Mirkovic and P. Reiher. “A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms,” ACM SIGCOMM Computer Communications Review, Vol. 349, No. 2, April 2004, pp. 39-54. doi:10.1145/997150.997156
|
[9]
|
S. Kumar, “Smurf Based Denial of Service Attack Amplification in Internet,” IEEE Computer Society, ICIMP, 2007.
|
[10]
|
M. R. Lyu and L. K. Y. Lau, “Firewall Security: Policies, Testing and Performance Evaluation,” The 24th Annual International Computer Software and Applications Conference, Taipe, 25-27 October 2000, pp. 116-121.
|
[11]
|
R. K. C. Chang “Defending Against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial,” IEEE Communications, Vol. 40, No. 10, April 2002, pp. 42-51. doi:10.1109/MCOM.2002.1039856
|
[12]
|
S. Kumar, M. Azad, O. Gomez and R. Valdez, “Can Microsoft’s Service Pack-2 (SP2) Security Software Prevents Smurf Attacks?” Advanced International Conference on Telecommunications, Guadeloupe, September 2006, pp. 89-93.
|
[13]
|
S. Kumar and E. Petana, “Mitigation of TCP-SYN Attacks with Microsoft’s Windows XP Service Pack2 (SP2) Software,” Seventh International Conference on Networking, Cancun, 13-18 April 2008, pp. 238-242. doi: 10.1109/ICN.2008.77
|
[14]
|
“Juniper Networks NetScreen NS 5GT Security Policy,” 15 October 2010. http://csrc.nist.gov/groups/STM/cmvp/ documents/140-1/140sp/140sp629.pdf
|
[15]
|
Juniper Networks, Inc., “Attack Detection and Defense Mechanisms,” 2008. http://www.juniper.net/techpubs/soft- ware/screenos/screenos5x/ce_v4_5_0.pdf
|