1. Rocky, K., Chang, C.: Defending against flooding-based distributed denial-of-service at-tacks: a tutorial. IEEE Commun. Mag. 40, 42–51 (2002)
2. Moor, D., Shannon, C., Brown, D.J., Voelker, G.M., Savage, S.: Inferring internet denial-of-service activity. ACM Trans. Comput. Syst. (TOCS) 24(2), 115–139 (2006)
3. Schuba C. L., Krsul, I., Huhn M. G., Spafford E. H., Sundaram A.: Analysis of a denial of service attack on TCP. Computer Science Technical Reports. Paper 1327 (1996). http://docs.lib.purdue.edu/cstech/1327
4. CERT Advisory CA-1996-21 TCP SYN Flooding and IP Spoofing Attacks, November 2000. http://www.cert.org/advisories/CA-1996-21.html
5. CERT Advisory CA-1996-01 UDP Port Denial-of-Service Attack, September 1997. http://www.cert.org/advisories/CA-1996-01.html