References
To learn more about the topics that were covered in this chapter, take a look at the following resources:
- Mansfield-Devine, S. (2014). The evolution of DDoS. Computer Fraud & Security, 2014(10), 15-20.
- Zargar, S. T., Joshi, J., & Tipper, D. (2013). A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks. IEEE Communications Surveys & Tutorials, 15(4), 2046-2069.
- Cloudflare. (2023). DDoS threat report for 2023 Q4: https://blog.cloudflare.com/ddos-threat-report-2023-q4/
- Imperva (2023). The Imperva Global DDoS Threat Landscape Report 2023: https://www.imperva.com/resources/reports/the-imperva-global-ddos-threat-landscape-report-2023.pdf?ref=blog.kybervandals.com
- MITRE. (n.d.). Technique T1498.002: Network Denial of Service | MITRE ATT&CK®: https://attack.mitre.org/techniques/T1498/002/
- Cybersecurity & Infrastructure Security Agency. (2014, January 17). UDP-Based Amplification Attacks:...