1. Yehuda Afek , Anat Bremler-Barr , and Lior Shafir . 2020 . NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities . In Proceedings of the 29th USENIX Security Symposium. 631–648 . Yehuda Afek, Anat Bremler-Barr, and Lior Shafir. 2020. NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities. In Proceedings of the 29th USENIX Security Symposium. 631–648.
2. Amazon. 2013. Amazon Route 53 Developer Guide. Retrieved April 1, 2022 from https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/route53-dg.pdf Amazon. 2013. Amazon Route 53 Developer Guide. Retrieved April 1, 2022 from https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/route53-dg.pdf
3. The Menlo Report
4. Fred Baker and Pekka Savola. March 2004. BCP 84: Ingress Filtering for Multihomed Networks. Online: https://tools.ietf.org/search/bcp84. Fred Baker and Pekka Savola. March 2004. BCP 84: Ingress Filtering for Multihomed Networks. Online: https://tools.ietf.org/search/bcp84.
5. CAIDA. 2020. Spoofer Project. Retrieved April 1 2022 from https://www.caida.org/projects/spoofer/ CAIDA. 2020. Spoofer Project. Retrieved April 1 2022 from https://www.caida.org/projects/spoofer/