Publisher
Springer Nature Switzerland
Reference26 articles.
1. RIR Statistics. https://www.nro.net/about/rirs/statistics/
2. Alieyan, K., Kadhum, M.M., Anbar, M., Rehman, S.U., Alajmi, N.K.: An overview of DDoS attacks based on DNS. In: 2016 International Conference on Information and Communication Technology Convergence (ICTC), pp. 276–280. IEEE (2016)
3. AMSIX: Pricing | AMS-IX Amsterdam (2023). https://www.ams-ix.net/ams/pricing
4. Antonakakis, M., et al.: Understanding the Mirai botnet. In: 26th $$\{$$USENIX$$\}$$ security symposium ($$\{$$USENIX$$\}$$ Security 17), pp. 1093–1110 (2017)
5. Bailey, M., Dittrich, D., Kenneally, E., Maughan, D.: The Menlo report. IEEE Secur. Priv. 10(2), 71–75 (2012)