@incollection{, EE5F914285BBA1C3F56390B8D003E950 , author={{Dr. NVinutha} and {Auroras Technological and Research Institute, JNTU}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}11195154 } @book{b0, , title={{Detecting Malicious Packet Losses}} , author={{ TAlper } and { StudentZrak } and { Member } and { StefanIeee } and { Savage } and { IeeeKeithMember } and { MemberMarzullo }} , year={Feb 2009} } @incollection{b1, , title={{Detecting Disruptive Routers: A Distributed Network Monitoring Approach}} , author={{ KABradley } and { SCheung } and { NPuketza } and { BMukherjee } and { RAOlsson }} , booktitle={{Proc. IEEE Symp. Security and Privacy (S&P '98)}} IEEE Symp. Security and Privacy (S&P '98) , year={May 1998} } @incollection{b2, , title={{Detecting and Isolating Malicious Routers}} , author={{ ATMizrak } and { Y.-CCheng } and { KMarzullo } and { SSavage }} , journal={{IEEE Trans. Dependable and Secure Computing}} 3 3 , year={July-Sept. 2006} } @incollection{b3, , title={{Protecting Routing Infrastructures from Denial of Service Using Cooperative Intrusion Detection}} , author={{ SCheung } and { KLevitt }} , booktitle={{Proc. New Security Paradigms Workshop}} New Security Paradigms Workshop , year={1997} } @book{b4, , title={{Using a Compromised Router to Capture Network Traffic}} , author={{ DTaylor }} , year={July 2002} , note={unpublished technical report} } @book{b5, , title={{Efficientand and Secure Network Routing Algorithms}} , author={{ MTGoodrich }} , year={Jan. 2001} } @incollection{b6, , title={{Secure Trace route to Detect Faulty or Malicious Routing}} , author={{ VNPadmanabhan } and { DSimon }} , journal={{SIGCOMM Computer Comm. Rev}} 33 1 , year={2003} } @book{b7, , title={{Security Architecture for the Internet Protocol}} , author={{ SKent } and { RAtkinson }} RFC 2401 , year={November 1998} } @incollection{b8, , title={{The Effects of Systemic Packet Loss on Aggregate TCP Flows}} , author={{ TJHacker } and { BDNoble } and { BDAthey }} , booktitle={{Proc. ACM/IEEE Conf. Supercomputing (SC '02)}} ACM/IEEE Conf. Supercomputing (SC '02) , year={2002} } @incollection{b9, , title={{Random Early Detection Gateways for Congestion Avoidance}} , author={{ SFloyd } and { VJacobson }} , journal={{IEEE/ACM Trans. Networking (TON '93)}} 1 4 , year={1993} } @incollection{b10, , title={{Congestion control for high speed packet switched networks}} , author={{ KIBala } and { KCidon } and { Sohraby }} , booktitle={{Proc. INFOCOM '90}} INFOCOM '90 , year={1990} } @incollection{b11, , title={{REM: Active Queue Management}} , author={{ SAthuraliya } and { SLow } and { VLi } and { QYin }} , journal={{IEEE Network}} 15 3 , year={2001} } @book{b12, , title={{Optimization Flow Control, II: Implementation}} , author={{ SAthuraliya } and { SHLow }} , year={May 2000} , note={Submitted for publication} }