[1] J. Mirkovic, S. Dietrich, D. Dittrich, and P. Reiher, “Internet denial of service: Attack and defense mecha-nisms,” Prentice Hall PTR, 2004.
[2] V. A. Siris and F. Papagalou, “Application of anomaly detection algorithms for detecting SYN flooding attacks In: Regency H, ed,” Global Telecommunications Conf. (GLOBECOM’04). Dallas: IEEE, pp. 2050–2054, 2004.
[3] W. Li, L. F. Wu, and G. Y. Hu, “Design and implementa-tion of distributed intrusion detection system NetNumen,” Journal of Software, pp. 1723–1728, 2002.
[4] M. Sung and J. Xu, “IP traceback-based intelligent packet filtering: A novel technique for defending against Internet DDoS attacks,” IEEE Trans. on Parallel and Distributed Systems, pp. 861–872, 2003.
[5] A. Chandra and P. Shenoy, “Effectiveness of dynamic resource allocation for handling Internet,” University of Massachussets, 2003.
[6] F. Liang and D. Yau, “Using adaptive router throttles against distributed denial-of-service attacks,” Journal of Software, pp. 1120–1127, 2002.
[7] A. B. Kulkarni, S. F. Bush, and S. C. Evans, “Detecting distributed denial-of-service attacks using kolmogorov complexity metrics,” General Electric Research and De-velopment Center, December 2001.
[8] J. Mirkovic, “D-WARD: Source-end defense against distributed denial-of-service attacks,” PhD thesis, Univer-sity of California, Los Angeles, pp. 310–321, August 2003.
[9] C. Jin, H. Wang, and K. G. Shin, “Hop-count filtering: An effective defense against spoofed DDoS traffic,” Pro-ceedings of the 10th ACM Conference on Computer and Communication Security, ACM Press, pp. 30–41, Octo-ber, 2003.
[10] Y. Chen, K. Hwang, and Y. K. Kwok, “Filtering of shrew DDoS attacks in frequency domain,” lcn, pp. 786–793, The IEEE Conference on Local Computer Networks 30th Anniversary (LCN’05), Jan. 2005.
[11] C. Sangpachatanaruk, S. M. Khattab, T. Znati, R. Mel-hem, and D. Mosse’, “A simulation study of the proactive server roaming for mitigating denial of service attacks,” Proceedings of the 36th Annual Simulation Symposium (ANSS’03), pp. 1430–1441, March 2003.
[12] Bell Labs. Bell Labs Internet Traffic Research. http:// stat.bell-labs.com/InternetTraffic/index.html.
[13] ICSI Center for Internet Research Traffic Generators for Internet Traffic. http://www.icir.org/models/trafficgenerat ors.html.