1. [1] Secure64 Software Corporation: Water Torture: A Slow Drip DNS DDoS Attack, Secure64 Software Corporation (online), available from <https://blog.secure64.com/?p=377> (accessed 2015-11-30).
2. [2] Takeuchi, Y., Yoshida, T., Kobayashi, R., Kato, M. and Kishimoto, H.: Detection of the DNS Water Torture Attack by Analyzing Features of the Subdomain Name, Journal of Information Processing, Vol.24, No.5, pp.793-801 (online), DOI: 10.2197/ipsjjip.24.793 (2016).
3. [3] Yoshida, T., Takeuchi, Y., Kobayashi, R., Kato, M. and Kishimoto, H.: Study on Filtering Method for the DNS Water Torture Attack Utilizing the Naive Bayes Classifier (in Japanese), IPSJ SIG Notes, 2016-CSEC-74, No.26, pp.1-7 (2016).
4. [4] Yuchi, X., Wang, X., Lee, X. and Yan, B.: A New Statistical Approach to DNS Traffic Anomaly Detection, pp.302-313 (online), DOI: 10.1007/978-3-642-17313-4_30, Springer Berlin Heidelberg (2010).
5. [5] US-CERT: DNS Amplification Attacks ¦ US-CERT, United States Computer Emergency Readiness Team (online), available from <https://www.us-cert.gov/ncas/alerts/TA13-088A> (accessed 2016-10-18).