@incollection{, DBB51E62A4A10482DF1F8751CAE516A6 , author={{K MunivaraPrasad} and {Dr.A Rama MohanReddy} and {Rayalaseema University,Kurnool}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}11211524 } @book{b0, , author={{ RiccardoWei Yu } and { WeiZhao }} , title={{localization attacks to internet threat monitors:Modeling and countermeasures"on ieee transactions on computers}} , year={december 2010} 59 } @incollection{b1, , title={{A Taxonomy of DDOS Attack and DDOS Defense Mechanisms}} , author={{ JMirkovic } and { PReiher }} , journal={{ACM SIGCOMM Computer Comm.Rev}} 34 2 , year={Apr. 2004} } @book{b2, , title={{}} , author={{ InternetStormSans } and { Center }} , year={2010} } @incollection{b3, , title={{Inferring Internet Deny-of-Service Activity}} , author={{ DMoore } and { GMVoelker } and { SSavage }} , booktitle={{Proc. 10th USNIX Security Symp. (SEC)}} 10th USNIX Security Symp. (SEC) , year={Aug. 2001} } @incollection{b4, , title={{Global Intrusion Detection in the Domino Overlay System}} , author={{ PYegneswaran } and { SBarford } and { Jha }} , booktitle={{Proc. 11th IEEE Network and Distributed System Security Symp. (NDSS)}} 11th IEEE Network and Distributed System Security Symp. (NDSS) , year={Feb. 2004} } @incollection{b5, , title={{The Internet Motion Sensor: A Distributed Blackhole Monitoring System}} , author={{ MBailey } and { ECooke } and { FJahanian } and { JNazario } and { DWatson }} , booktitle={{Proc. 12th Ann. Network and Distributed System Security Symp. (NDSS)}} 12th Ann. Network and Distributed System Security Symp. (NDSS) , year={Feb. 2005} } @incollection{b6, , title={{Mapping Internet Sensors with Probe Response Attacks}} , author={{ JBethencourt } and { JFrankin } and { MVernon }} , booktitle={{Proc. 14th USNIX Security Symp. (SEC)}} 14th USNIX Security Symp. (SEC) , year={July/Aug. 2005} } @incollection{b7, , title={{Vulnerabilities of Passive Internet Threat Monitors}} , author={{ YShinoda } and { KIkai } and { MItoh }} , booktitle={{Proc. 14th USNIX Security Symp. (SEC)}} 14th USNIX Security Symp. (SEC) , year={July/Aug. 2005} } @incollection{b8, , title={{Iloc: An Invisible Localization Attack to Internet Threat Monitoring Systems}} , author={{ XWang } and { WYu } and { XFu } and { DXuan } and { WZhao }} , booktitle={{Proc.IEEE INFOCOM}} .IEEE INFOCOM , year={Apr. 2008} } @incollection{b9, , title={{Ip Covert Timing Channels:Design and Detection}} , author={{ SCabuk } and { CBrodley } and { CShields }} , booktitle={{Proc. 2004 ACM Conf. Computer and Comm.Security (CCS)}} 2004 ACM Conf. Computer and Comm.Security (CCS) , year={Oct. 2004} } @incollection{b10, , title={{The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets}} , author={{ ECooke } and { FJahanian } and { DMcpherson }} , booktitle={{Proc. Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI)}} Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI) , year={July 2005} } @incollection{b11, , title={{Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks}} , author={{ FCFreiling } and { THolz } and { GWicherski }} , booktitle={{Proc. 10th European Symp. Research in Computer Security (ESORICS)}} 10th European Symp. Research in Computer Security (ESORICS) , year={Sept. 2005} } @book{b12, , title={{The mstream distributed denial of service attack tool}} } @book{b13, , author={{ JOikarinen } and { DReed }} , title={{RFC 1459: Internet Relay Chat Protocol}} , year={1993} } @book{b14, , title={{Analysis of Internet Relay Chat Usage by DDoS Zombies}} , author={{ St´ephaneRacine }} , year={April 2004} Swiss Federal Institute of Technology Zurich , note={Master's thesis} } @book{b15, , title={{The Honeynet Project. Know your enemy: rackingbotnets}} , year={March 2005} } @book{b16, , author={{ YingXuan } and { MyTShin } and { Thai } and { TaiebMember } and { Znati }} , title={{Member, Detecting Application Denialof-Service Attacks: A Group-Testing-Based}} }