[ 1] Lee S C, Sh ie lds C. T rac ing the sou rce of netwo rk a-t tack: A techn ica l lega l and soc ie tal problem [ A ]. Proceed ing s of the 2001 IEEEW orkshop on Info rm ation Assurance and Secur ity [ C]. Oakland: IEEE Com pute r Soc iety Press, 2001. 239- 246.
[ 2] 夏春和, 王海泉, 吴震, 等. 攻击源定位问题的研究[ J]. 计算机研究与发展, 2003, 40 ( 7 ): 1 021 - 1 027.
[ 3] Savage S, W ethe ra ll D, K arlin A, et a.l Netw ork support for IP traceback [ J]. IEEE /ACM Transac tions on Ne-t wo rk, 2001, 9( 3): 226- 237.
[ 4] Dean D, FranklinM, Stubblefield A. An algebra ic approach to IP traceback [ J]. ACM Transac tions on Info rma tion and System Security, 2002, 5( 2): 119 - 137.
[ 5] M cConnellM, H am ilton A. Info rm ation assurance in the tw en ty- first century [ EB /OL] . http: / /www. com puter. org / secur ity /supp lement1 /mcc, 2004- 04- 15.
[ 6] M orr is R T. A w eakness in the 4. 2BSD UN IX TCP / IP so ftw are [ R]. New Je rsey: Am erican Telephone and Te-l egraph Com pany Be ll Laborator ies, 1985.