1. Juniper Networks. Understanding teardrop attacks, JUNOS software security configuration guide. https://www.juniper.net/techpubs/software/junos-es/junos-es93/junos-es-swconfig-security/understanding-teardrop-attacks.html
2. Cisco Systems Inc.: Configuring Port Security, Catalyst 6500 Release 12.2SX Software Configuration Guide, pp. 62–67. https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/port_sec.html#wp1055296%0A (2013)
3. Wen, S., Jia, W., Zhou, W., Zhou, W., Xu, C.: CALD: surviving various application-layer DDoS attacks that mimic flash crowd. In: 4th International Conference on Network and System Security (NSS) (2010)
4. AT&T. Denial of Service—DDoS Protection. http://www.business.att.com/enterprise/Service/network-security/threat-vulnerability-management/ddos-protection/
5. Verizon. Cloud security: move to the cloud with confidence. http://www.verizonenterprise.com/products/security/managed/?utm_source=pdf&utm_medium=infographic&utm_content=ddos&utm_campaign=Security2013