1. Verisign: what is a ddos attack? https://blog.verisign.com/security/ddos-protection/q2-2018-ddos-trends-report-52-percent-of-attacks-employed-multiple-attack-types/, (2018). Accessed 11 March 2019
2. Arkko, J.: Centralised architectures in internet infrastructure. Internet-Draft draft-arkko-arch-infrastructure-centralisation-00, Internet Engineering Task Force, (2019). Work in Progress
3. Bhardwaj, K., Miranda, J.C., Gavrilovska, A.: Towards iot-ddos prevention using edge computing. In: USENIX Workshop on Hot Topics in Edge Computing (HotEdge 18). USENIX Association, Boston (2018)
4. Doshi, R., Apthorpe, N., Feamster, N.: Machine learning ddos detection for consumer internet of things devices. In: 2018 IEEE Security and Privacy Workshops (SPW), pp. 29–35 (2018)
5. SNORT Team Project. Snort users manual (2020)