1. TFN2K—An analysis by Jason Barlow and Woody Thrower;Barlow,2001
2. Bridis, T (2002). Powerful attack cripples majority of key Internet computers. Yahoo! News, Oct. 22, 2002.
3. Proactive detection of distributed denial of service attacks using MIB traffic variables—A feasibility study;Cabreraa,2001
4. DDoS attacks;CERT Coordination Center,2003
5. Defending against flooding-based distributed denial of service attacks: A tutorial;Chang;IEEE Communications Magazine,2002