1. Microsoft: Microsoft security intelligence report, Microsoft, vols. 9–17 (2010–2014)
2. Zargar, S.T., Joshi, J., Tipper, D.: A survey of defense mechanisms against Distributed Denial of Service (DDoS) flooding attacks. IEEE Commun. Surv. Tutor. 15(4), 2046–2069 (2013)
3. Liu, S.: Surviving distributed Denial-of-Service attacks. IT Prof. 11(5), 51–53 (2009)
4. Specht, S.M., Lee, R.B.: Distributed Denial of Service: taxonomies of attacks, tools and countermeasures. In: 17th International Conference on Parallel and Distributed Computing Systems (ICPADS), San Francisco, CA, USA, 15–17 September 2004, pp. 543–550 (2004)
5. Asghari, H., van Eeten, M.J.G., Bauer, J.M.: Economics of fighting botnets: lessons from a decade of mitigation. IEEE Secur. Priv. 13(5), 16–23 (2015)