[1]
|
H. Yang, H. Y. Luo, F. Ye, S. W. Lu and L. X. Zhang, “Security in Mobile Ad Hoc Networks,” IEEE Wireless Communications Challenges and Solutions, Vol. 11, No. 1, 2004, pp. 38-47.
http://dx.doi.org/10.1109/MWC.2004.1269716
|
[2]
|
D. Moore, G. Voelker and S. Savage, “Inferring Internet Denial-of-Service Activity,” 10th ACM USENIX Security Symposium, 2002, pp. 9-22.
|
[3]
|
I. Aad, J. P. Hubaux and E. Knightly, “Impact of Denial of Service Attacks on Ad Hoc Networks,” IEEE/ACM Transactions on Net-working, Vol. 16, No. 4, 2008, pp. 791-802. http://dx.doi.org/10.1109/TNET.2007.904002
|
[4]
|
Y. Jing, X. Wang, X. Xiao and G. Zhang, “Defending Against Meek DDoS Attacks By IP Traceback-based Rate Limiting,” 49th GLOBECOM 2006, San Francisco, November 2006.
|
[5]
|
A. Belenky and N. Ansari, “On IP Traceback,” IEEE Communications Magazine, Vol. 41, No. 7, 2003, pp. 142-153. http://dx.doi.org/10.1109/MCOM.2003.1215651
|
[6]
|
Y. Jing, X. Wang, L. Zhang and G. Zhang, “Stable Topology Support for Tracing DDoS Attackers in MANET,” 54th GLOBECOM 2011, Houston, December 2011.
|
[7]
|
R. Ahlawede, N. Cai, S. R. Li and R. W. Yeung, “Network Information Flow,” IEEE Transactions on Information Theory, 2000.
|
[8]
|
Wikipedia. Gaussian Elimination.
http://en.wikipedia.org/wiki/Gaussian_elimination
|
[9]
|
S. Savage, D. Wetherall, A. Karlin and T. Anderson, “Practical Network Support for IP Traceback,” ACM SIGCOMM Computer Communication Review, Vol. 30, No. 4, 2000, pp. 295-306.
http://dx.doi.org/10.1145/347057.347560
|
[10]
|
GloMoSim Simulator.
http://pcl.cs.ucla.edu/projects/glomosim/ography
|
[11]
|
S. Bellovin, M. Leech and T. Taylor, “ICMP Traceback Messages,” 2001.
http://www3.ietf.org/proceedings/01dec/I-D/draft-ietf-itrace-01.txt
|
[12]
|
R. Stone, “CenterTrack: An IP Overlay Network for Tracking DoS Floods,” Proceedings of the 2000 USENIX Security Symposium, Denver, CO, July 2000.
|
[13]
|
A. C.Snoeren, C. Partridge, L. A. Sanchez and C. E. Jones, “Hash-Based IP Traceback,” Proceedings of the 2001 Conference of Applications, Technologies, Architectures, and Protocols for Computer Communications, August 2001, pp. 3-14.
|
[14]
|
V. L. L. Thing and H. C. J. Lee, “IP Traceback for Wireless Ad-Hoc Networks,” 60th IEEE Vehicular Technology Conference, Los Angeles, September 2004.
|
[15]
|
Y. Huang and W. Lee, “Hotspot-Based Traceback for Mobile Ad Hoc Networks,” Proceedings of the ACM Workshop on Wireless Security, 2005.
|
[16]
|
D. Sy and L. Bao, “CAPTRA: Coordinated Packet Traceback,” Proceedings of the 5th International Conference on Information Processing in Sensor Networks, April 2006, pp. 124-135.
|
[17]
|
I.-Y. Kim and K.-C. Kim, “A Resource-Efficient IP Traceback Technique for Mobile Ad-hoc Networks Based on Time-tagged Bloom Filter,” International Conference on Convergence and Hybrid Information Technology, 2008, pp. 549-554.
|
[18]
|
Y. Kim and A. Helmy, “SWAT: Small World-Based Attacker Traceback in Ad-hoc Networks,” Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous System: Networking and Services, San Diego, July 2005.
|
[19]
|
B.-C. Cheng, H. Chen and R.-Y. Tseng, “A Packet Marking with Fair Probability Distribution Function for Minimizing the Convergence Time in Wireless Sensor Networks,” Computer Communications, Vol. 31, No. 18, 2008, pp. 4352-4359.
http://dx.doi.org/10.1016/j.comcom.2008.03.024
|
[20]
|
B.-C. Cheng, H. Chen and G.-T. Liao, “FBT: An Efficient Traceback Scheme in Hierarchical Wireless Sensor Network”, Security and Communication Networks, Vol. 2, No. 2, 2009, pp.133-144. http://dx.doi.org/10.1002/sec.88
|
[21]
|
X. Jin, Y. X. Zhang, Y. Pan and Y. Z. Zhou, “ZSBT: A Novel Algorithm for Tracing DOS Attackers in MANETS,” EURASIP Journal on Wireless Communications and Networking, Vol. 2006, pp. 1-9.
|
[22]
|
M.-H. Yang, C.-S. Chiu and S. Shieh, “Tracing Mobile Attackers in Wireless Ad-Hoc Network,” ICIW 2008, pp. 7-12.
|
[23]
|
A. K. Das, S. Agrawal and S. Vishwanath, “Algebraic Traceback for Dynamic Networks,” 2009.
|