1. Architecture and key technologies of internet address security[J];Ke X U;Journal of Software,2014
2. Bellovin S M , Leech M , Taylor T. ICMP traceback messages[J] . 2003 . Bellovin S M, Leech M, Taylor T. ICMP traceback messages[J]. 2003.
3. Lee H C J , Thing V L L , Xu Y, ICMP traceback with cumulative path, an efficient solution for IP traceback[C]//International Conference on Information and Communications Security . Springer , Berlin, Heidelberg , 2003 : 124-135. Lee H C J, Thing V L L, Xu Y, ICMP traceback with cumulative path, an efficient solution for IP traceback[C]//International Conference on Information and Communications Security. Springer, Berlin, Heidelberg, 2003: 124-135.
4. Liu B Y . Design on the deployability evaluation model of Internet Inter domain source address validation [Ph. D. Thesis] [J] . Beijing : Tsinghua University , 2014 . Liu B Y. Design on the deployability evaluation model of Internet Inter domain source address validation [Ph. D. Thesis] [J]. Beijing: Tsinghua University, 2014.
5. Park K , Lee H. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets[J]. ACM SIGCOMM computer communication review , 2001 , 31(4): 15-26. Park K, Lee H. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets[J]. ACM SIGCOMM computer communication review, 2001, 31(4): 15-26.