M. Handley and E. Rescorla, “Internet Denial-of-Service Considerations,” RFC 4732, 2006.
(2000) Yahoo on Trail of Site Hackers. [Online]. Available: http://www.wired.com/techbiz/media/news/2000/02/34221
(2002) Powerful attack cripples majority of key Internet computers. [Online]. Available: http://www.securityfocus.com/news/1400
(2010) Operation Payback cripples MasterCard site in revenge for WikiLeaks ban. [Online]. Available: http://www.theguardian.com/media/2010/dec/08/operation-payback-mastercard-website-wikileaks
(2013) DDoS: Lessons from Phase 2 Attacks. [Online]. Available: http://www.bankinfosecurity.com/ddos-attacks-lessons-from-phase-2-a-5420/op-1
H. F. Lipson, “Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy,” CERT Coordination Center, 2002.
J. Mirkovic and P. Reiher, “A Taxonomy of DDoS Attack and DDoS Defense Mechanisms,” in Proc. ACM SIGCOMM, 2004.
N. Long and R. Thomas, “Trends in Denial of Service Attack Technology,” CERT Coordination Center, 2001.
(1997) CERT/CC Denial of Service. [Online]. Available: http://www.cert.org/tech_tips/denial_of_service.html
W. Stallings and L. Brown, Computer Security: Principles and Practice, Pearson, 2008.
C. Douligeris and A. Mitrokotsa, “DDoS attacks and defense mechanisms: classification and state-of-the-art,” Computer Networks, 2004.
M. Abliz, “Internet Denial of Service Attacks and Defense Mechanisms,” University of Pittsburgh, Department of Computer Science, Technical Report, 2011.
(2010) Perhaps the First DoS Attack. [Online]. Available: http://www.platohistory.org/blog/2010/02/perhaps-the-first-denial-of-service-attack.html
K. Scarfone and K. Masone, “Computer Security Incident Handling Guide Recommendations of the National Institute of Standards and Technology,” National Institute of Standards and Technology, 2008.
(2013) RioRey Taxonomy of DDoS Attacks. [Online]. Available: https://riorey.com/x-resources/2013/RioRey_Taxonomy_DDoS_Attacks_2.4_2013.pdf
(1996) CERT Advisory CA-1996-01 UDP Port Denial-of-Service Attack. [Online]. Available: http://www.cert.org/advisories/CA-1996-01.html
B. K. Lokesh, “Denial of Service Attacks - DDOS, SMURF, FRAGGLE, TRINOO,” 2001.
(1996) CERT Advisory CA-1996-21 TCP SYN Flooding and IP Spoofing Attacks. [Online]. Available: http://www.cert.org/advisories/CA-1996-21.html
T. Peng, C. Leckie, and K. Ramamohanarao, “Survey of Network Based Defense Mechanisms Countering the DoS and DDoS Problems,” in Proc. ACM-CSUR, 2007.
G. Malkin, “Internet Users’ Glossary,” RFC 1983, 1996.
J. Postel, “Internet Control Message Protocol,” RFC 792, 1981.
H. Burch, “Tracing Anonymous Packets to Their Approximate source,” in Proc. 14th Systems Administration Conference, 2000.
J. Postel, “Transmission Control Protocol,” RFC 793, 1981.
J. Postel, “User Datagram Protocol,” RFC 768, 1980.
Y. Rehkter, T. Li, S. Hares, “A Border Gateway Protocol 4,” RFC 4271, 2006.
J. Nazario, “Black Energy DDoS Bot Analysis,” Arbor Networks, 2007.
M. V. Steen, Graph Theory and Complex Networks, 2010.
A. L. Barabasi and E. Bonabeau, “Scale-Free Networks,” Scientific American, 2003.
M. Faloutsos, P. Faloutsos, and C. Faloutsos, “On power-law relationships of the Internet Topology,” National Science Foundation, 1999.
R. Albert, H. Jeong, and A.-L. Barabasi, “Error and Attack Tolerance of Complex Networks,” Nature, 2003.
S. Tauro, C. Palmer, G. Siganos, and M. Faloutsos, “A Simple Conceptual Model for the Internet Topology,” National Science Foundation, 2001.
(2013) The Internet Map. [Online]. Available: http://internet-map.net/
D. Magoni, “Tearing Down the Internet,” IEEE Journal on Selected Areas in Communications, 2003.
(2013) NetSizer: Internet growth forecasting tool. [Online]. Available: http://www.netsizer.com/
A. Kuzmanovic and E. Knightly, “Low Rate TCP Targeted Denial of Service Attacks,” in Proc. SIGCOMM, 2003.
V. Paxson, M. Allman, J. Chu, and M. Sargent, “Computing TCP’s Retransmission Timer,” RFC 6298, 2011.
J. Hawkinson and T. Bates, “Guidelines for creation, selection, and registration of an Autonomous System,” RFC 1930, 1996.
G. Malkin, “RIP Version 2,” RFC 2453, 1998.
J. Moy, “OSPF Version 2,” RFC 2328, 1998.
L. L. Peterson, B. S. Davie, Computer Networks, Morgan Kaufmann Publishers, 2010.
M. Schuchard, Y. Vasserman, A. Mohaisen, D. F. Kune, N. Hopper, and Y. Kim, “Losing Control of the Internet: Using the Data Plane to attack to Control Plane,” in Proc. NDSS, ACM, 2010.
K. Sriram, D. Montgomery, O. Borchert, O. Kim, and D. R Kuhn, “Study of BGP Peering Session Attacks and Their Impacts on Routing Performance,” IEEE Journal on Selected Areas in Communications: Special issue on High-Speed Network Security, 2006.
F. Wang, Z. M. Mao, J. Wang, L. Gao, and R. Bush, “A Measurement Study on the Impact of Routing Events on End to End Internet Path Performance,” in Proc. SIGCOMM, 2006.
Y. Zhang, Z. M. Mao, and J. Wang, “Low Rate TCP Targeted DoS Attack Disrupts Internet Routing,” in Proc. 14th Annual Network and Distributed System Security Symposium, 2007.
C. Labovitz, A. Ahuja and F. Jahanian, “Experimental Study of Internet Stability and Wide-Area Network Failures,” National Science Foundation, 1999.
C. Labovitz, R. Malan, and F. Jahanian, “Internet Routing Instability,” IEEE/ACM Transactions on Networking, 1998.
A. Shaikh, L. Kalampoukas, R. Dube, and A. Varma, “Routing Stability in Congested Networks: Experimentation and Analysis,” in Proc. ACM SIGCOMM, 2000.
(2013) BGP Routing Table Analysis. [Online]. Available: http://bgp.potaroo.net/
(2013) BGP Instability Report. [Online]. Available: http://bgpupdates.potaroo.net/instability/bgpupd.html
A. Studer and A. Perrig, “The Coremelt Attack,” in Proc. ESORICS, 2010.
S. Savage, N. Cardwell, D. Wetherall, and T. Anderson, “TCP Congestion Control with a Misbehaving Receiver,” National Science Foundation, USENIX, 1999.
(2013) CAIDA: As relationships dataset. [Online]. Available: http://www.caida.org/data/as-relationships/
M. Schuchard, “Stormcaller Simulator,” 2010.