1. Afek, Y., Bremler-Barr, A., Shafir, L.: NXNSAttack: recursive DNS inefficiencies and vulnerabilities. In: 29th USENIX Security Symposium (USENIX Security 20), pp. 631–648. USENIX Association, August 2020
2. Augustin, B., et al.: Avoiding traceroute anomalies with Paris traceroute. In: Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, pp. 153–158. IMC 2006. Association for Computing Machinery, New York (2006)
3. AWS Shield: Threat Landscape Report - Q1 (2020). https://aws-shield-tlr.s3.amazonaws.com/2020-Q1_AWS_Shield_TLR.pdf
4. Bayer, J., et al.: Study on Domain Name System (DNS) abuse final report. Tech. rep. (2022)
5. Bock, K., Alaraj, A., Fax, Y., Hurley, K., Wustrow, E., Levin, D.: Weaponizing middleboxes for TCP reflected amplification. In: 30th USENIX Security Symposium (USENIX Security 21), pp. 3345–3361. USENIX Association, August 2021