1. [1] Secure64: Water Torture: A Slow Drip DNS DDoS Attack, Secure64 Software Corporation (online), available from <https://blog.secure64.com/?p=377> (accessed 2015-11-30).
2. [2] Okayasu, S. and Sasaki, R.: Evaluation of Method for Detecting C&C Server of Botnet Using the Latest Data (in Japanese), Proc. 2014 Computer Security Symposium, Vol.2014, No.2, pp.175-182 (2014).
3. [3] Karasaridis, A., Meier, H.K. and Hoeflin, D.: NIS04-2: Detection of DNS Anomalies using Flow Data Analysis, Global Telecommunications Conference, GLOBECOM '06, pp.1-6, IEEE (2006).
4. [4] Joe, M.: Random dns queries with random sources, The Tri Tech Group (online), available from <http://www.gossamer-threads.com/lists/nanog/users/169123> (accessed 2015-11-30).
5. [5] Nishida, K.: Water Torture: A Slow Drip DNS DDoS Attack on QTNet, Kyushu Telecommunication Network Co., Inc. (online), available from <http://www.slideshare.net/apnic/dnswatertortureonqtnet-1425130417-1425507043> (accessed 2015-11-30).