{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T04:31:46Z","timestamp":1773117106550,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":180,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T00:00:00Z","timestamp":1730678400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2212241, OAC-2319959"],"award-info":[{"award-number":["CNS-2212241, OAC-2319959"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Bundesministerium f\u00fcr Bildung und Forschung","award":["PRIMEnet"],"award-info":[{"award-number":["PRIMEnet"]}]},{"DOI":"10.13039\/501100006374","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["ReNO (#511099228)"],"award-info":[{"award-number":["ReNO (#511099228)"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,4]]},"DOI":"10.1145\/3646547.3688451","type":"proceedings-article","created":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T09:40:26Z","timestamp":1730454026000},"page":"259-279","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["The Age of DDoScovery: An Empirical Comparison of Industry and Academic DDoS Assessments"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1676-8108","authenticated-orcid":false,"given":"Raphael","family":"Hiesgen","sequence":"first","affiliation":[{"name":"HAW Hamburg, Hamburg, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6308-5502","authenticated-orcid":false,"given":"Marcin","family":"Nawrocki","sequence":"additional","affiliation":[{"name":"NETSCOUT, Westford, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1505-6408","authenticated-orcid":false,"given":"Marinho","family":"Barcellos","sequence":"additional","affiliation":[{"name":"U of Waikato, Hamilton, New Zealand"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7012-5007","authenticated-orcid":false,"given":"Daniel","family":"Kopp","sequence":"additional","affiliation":[{"name":"DE-CIX, Frankfurt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7557-1081","authenticated-orcid":false,"given":"Oliver","family":"Hohlfeld","sequence":"additional","affiliation":[{"name":"University of Kassel, Kassel, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8304-8928","authenticated-orcid":false,"given":"Echo","family":"Chan","sequence":"additional","affiliation":[{"name":"Akamai\/Hong Kong PolyU, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-6998-4486","authenticated-orcid":false,"given":"Roland","family":"Dobbins","sequence":"additional","affiliation":[{"name":"NETSCOUT, Westford, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7913-2692","authenticated-orcid":false,"given":"Christian","family":"Doerr","sequence":"additional","affiliation":[{"name":"Hasso Plattner Institute, Potsdam, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2470-8444","authenticated-orcid":false,"given":"Christian","family":"Rossow","sequence":"additional","affiliation":[{"name":"CISPA, Dortmund, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8936-0683","authenticated-orcid":false,"given":"Daniel R.","family":"Thomas","sequence":"additional","affiliation":[{"name":"University of Strathclyde, Glasgow, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5174-9140","authenticated-orcid":false,"given":"Mattijs","family":"Jonker","sequence":"additional","affiliation":[{"name":"University of Twente, Enschede, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3300-9514","authenticated-orcid":false,"given":"Ricky","family":"Mok","sequence":"additional","affiliation":[{"name":"CAIDA\/UC San Diego, San Diego, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8211-257X","authenticated-orcid":false,"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"Hong Kong PolyU, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8994-124X","authenticated-orcid":false,"given":"John","family":"Kristoff","sequence":"additional","affiliation":[{"name":"NETSCOUT\/UIC, Illinois, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0956-7885","authenticated-orcid":false,"given":"Thomas C.","family":"Schmidt","sequence":"additional","affiliation":[{"name":"HAW Hamburg, Hamburg, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3825-2807","authenticated-orcid":false,"given":"Matthias","family":"W\u00e4hlisch","sequence":"additional","affiliation":[{"name":"TU Dresden, Dresden, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4824-3493","authenticated-orcid":false,"given":"kc","family":"claffy","sequence":"additional","affiliation":[{"name":"CAIDA\/UC San Diego, San Diego, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,11,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"A10. 2022. 2022 A10 Networks DDoS Threat Report. https:\/\/www.a10networks.com\/resources\/reports\/2022-ddos-threat-report\/"},{"key":"e_1_3_2_1_2_1","unstructured":"Emile Aben. 2016. [atlas] What is `iwantbcp38compliancetesting' user tag? ripe-atlas - RIPE Network Coordination Centre. https:\/\/www.ripe.net\/ripe\/mail\/archives\/ripe-atlas\/2016-January\/002581.html"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","unstructured":"Paul Aitken Beno^it Claise and Brian Trammell. 2013. Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information. RFC 7011. https:\/\/doi.org\/10.17487\/RFC7011","DOI":"10.17487\/RFC7011"},{"key":"e_1_3_2_1_4_1","unstructured":"Akamai. 2022. The Relentless Evolution of DDoS Attacks. https:\/\/www.akamai.com\/blog\/security\/relentless-evolution-of-ddos-attacks"},{"key":"e_1_3_2_1_5_1","unstructured":"Akamai. 2023. DDoS Attacks in 2022: Targeting Everything Online All at Once. https:\/\/www.akamai.com\/blog\/security\/ddos-attacks-in-2022-targeting-everything-online"},{"key":"e_1_3_2_1_6_1","unstructured":"Alibaba Cloud. 2021. DDoS Attack Statistics and Trend Report by Alibaba Cloud. https:\/\/www.alibabacloud.com\/blog\/ddos-attack-statistics-and-trend-report-by-alibaba-cloud_597607"},{"key":"e_1_3_2_1_7_1","volume-title":"European Symposium on Research in Computer Security (ESORICS). Springer-Verlag","author":"Anghel Radu","year":"2023","unstructured":"Radu Anghel, Swaathi Vetrivel, Elsa Turcios Rodriguez, Kaichi Sameshima, Daisuke Makita, Katsunari Yoshioka, Carlos H. Ga n\u00e1n, and Yury Zhauniarovich. 2023. Peering into the Darkness: The Use of UTRS in Combating DDoS Attacks. In European Symposium on Research in Computer Security (ESORICS). Springer-Verlag, Berlin, Heidelberg, 23--41."},{"key":"e_1_3_2_1_8_1","unstructured":"Anti-DDoS-Coalitie. 2023. Dutch National Anti-DDoS-coalition. https:\/\/www.nomoreddos.org\/en\/"},{"key":"e_1_3_2_1_9_1","volume-title":"Arelion DDoS Threat Landscape report","year":"2023","unstructured":"Arelion. 2023. Arelion DDoS Threat Landscape report 2023. https:\/\/www2.arelion.com\/wp-securityreport2023"},{"key":"e_1_3_2_1_10_1","unstructured":"Financial Conduct Authority. 2019. Interpreting the data. Financial Conduct Authority. https:\/\/www.fca.org.uk\/data\/mandated-voluntary-information-current-account-services\/interpreting-data"},{"key":"e_1_3_2_1_11_1","unstructured":"AWS. 2021. AWS Shield Threat Landscape Review: 2020 Year-in-Review. https:\/\/aws.amazon.com\/blogs\/security\/aws-shield-threat-landscape-review-2020-year-in-review\/"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"F. Baker and P. Savola. 2004. BCP 84 RFC 3704: Ingress Filtering for Multihomed Networks. https:\/\/www.rfc-editor.org\/info\/bcp84","DOI":"10.17487\/rfc3704"},{"key":"e_1_3_2_1_13_1","unstructured":"Marinho Barcellos Raphael Hiesgen Marcin Nawrocki Daniel Kopp Oliver Hohlfeld Echo Chan Roland Dobbins Christian Doer Christian Rossow Daniel R. Thomas Mattijs Jonker Ricky Mok Xiapu Luo John Kristoff Thomas C. Schmidt Matthias W\u00e4hlisch and KC Claffy. 2024. DDoS Industry Reports Repository. https:\/\/ddoscovery.github.io\/"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/378444.378449"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107391"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3098985"},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. of USENIX Security. USENIX Association","author":"Bock Kevin","year":"2021","unstructured":"Kevin Bock, Abdulrahman Alaraj, Yair Fax, Kyle Hurley, Eric Wustrow, and Dave Levin. 2021. Weaponizing Middleboxes for TCP Reflected Amplification. In Proc. of USENIX Security. USENIX Association, Berkeley, CA, USA, 3345--3361. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/bock"},{"key":"e_1_3_2_1_18_1","unstructured":"Brian Krebs. 2023. Feds Take Down 13 More DDoS-for-Hire Services. https:\/\/krebsonsecurity.com\/2023\/05\/feds-take-down-13-more-ddos-for-hire-services"},{"key":"e_1_3_2_1_19_1","volume-title":"Characterizing Certain DNS DDoS Attacks. CoRR","author":"Burton Ren\u00e9e","year":"2019","unstructured":"Ren\u00e9e Burton. 2019. Characterizing Certain DNS DDoS Attacks. CoRR, Vol. abs\/1905.09958 (2019), 25 pages.showeprint[arXiv]1905.09958 http:\/\/arxiv.org\/abs\/1905.09958"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"C. Loibl and S. Hares and R. Raszuk and D. McPherson and M. Bacher. 2020. Dissemination of Flow Specification Rules. https:\/\/www.rfc-editor.org\/rfc\/rfc8955.","DOI":"10.17487\/RFC8955"},{"key":"e_1_3_2_1_21_1","volume-title":"The UCSD Network Telescope. Website. https:\/\/www.caida.org\/projects\/network_telescope\/ Last Access","author":"CAIDA.","year":"2023","unstructured":"CAIDA. 2012. The UCSD Network Telescope. Website. https:\/\/www.caida.org\/projects\/network_telescope\/ Last Access: Nov 2023."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1039856"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","unstructured":"Beno\u00eet Claise. 2004. Cisco Systems NetFlow Services Export Version 9. RFC 3954. https:\/\/doi.org\/10.17487\/RFC3954","DOI":"10.17487\/RFC3954"},{"key":"e_1_3_2_1_24_1","volume-title":"Cambridge Cybercrime Centre: Legal framework","author":"Clayton Richard","unstructured":"Richard Clayton, Julia Powles, and Cambridge University Legal. 2016. Cambridge Cybercrime Centre: Legal framework. Cambridge Cybercrime Centre. https:\/\/www.cambridgecybercrime.uk\/data.html"},{"key":"e_1_3_2_1_25_1","unstructured":"Cloudflare. 2022. Cloudflare DDoS threat report 2022 Q3. https:\/\/blog.cloudflare.com\/cloudflare-ddos-threat-report-2022-q3"},{"key":"e_1_3_2_1_26_1","unstructured":"Cloudflare. 2022. Cloudflare DDoS threat report for 2022 Q4. https:\/\/blog.cloudflare.com\/ddos-threat-report-2022-q4\/"},{"key":"e_1_3_2_1_27_1","unstructured":"Cloudflare. 2022. DDoS Attack Trends for 2022 Q1. https:\/\/blog.cloudflare.com\/ddos-attack-trends-for-2022-q1\/"},{"key":"e_1_3_2_1_28_1","volume-title":"2022 d. DDoS Attack Trends for Q2","year":"2022","unstructured":"Cloudflare. 2022 d. DDoS Attack Trends for Q2 2022. https:\/\/blog.cloudflare.com\/ddos-attack-trends-for-2022-q2\/"},{"key":"e_1_3_2_1_29_1","unstructured":"Cloudflare. 2023. Cloudflare DDoS Trends Report Q1 2023. https:\/\/cf-assets.www.cloudflare.com\/slt3lc6tev37\/4CvITDALVKaap3iwrNOWxI\/f9a653dacc12d3635c1a1955b59a7b91\/BDES-4486_Q1-2023-DDoS-Trends-Report-Letter.pdf"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1177\/20539517221078756"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355592"},{"key":"e_1_3_2_1_32_1","volume-title":"Threat Report","author":"COMCAST.","year":"2021","unstructured":"COMCAST. 2021. Comcast Business DDoS Threat Report 2021. https:\/\/i.crn.com\/sites\/default\/files\/ckfinderimages\/userfiles\/images\/crn\/custom\/2022\/Comcast_LC_Q2_2022_DDoS_Threat_Report.pdf"},{"key":"e_1_3_2_1_33_1","unstructured":"COMCAST. 2023. 2023 Comcast Business Cybersecurity Threat Report. https:\/\/business.comcast.com\/community\/docs\/default-source\/default-document-library\/ccb_threatreport_071723_v2.pdf'sfvrsn=c220ac01_2"},{"key":"e_1_3_2_1_34_1","unstructured":"Corero. 2023. 2023 DDoS Threat Intelligence Report. https:\/\/www.juniper.net\/content\/dam\/www\/assets\/analyst-reports\/us\/en\/2023\/corero-ddos-threat-intelligence-report.pdf"},{"key":"e_1_3_2_1_35_1","unstructured":"Corero. 2023. How Have DDoS Attacks Evolved Over the Last 10 Years? https:\/\/www.corero.com\/ddos-attack-evolution\/"},{"key":"e_1_3_2_1_36_1","unstructured":"Corero. 2023. The Shifting Landscape of DDoS Attacks. https:\/\/www.corero.com\/shifting-landscape\/"},{"key":"e_1_3_2_1_37_1","volume-title":"Tracing DDoS End-to-End","author":"Labovitz Craig","year":"2021","unstructured":"Craig Labovitz. 2021. Tracing DDoS End-to-End in 2021. https:\/\/www.youtube.com\/watch?v=TP3H_GefL-0"},{"key":"e_1_3_2_1_38_1","unstructured":"Crowdstrike. 2023. Global Threat Report. https:\/\/www.crowdstrike.com\/global-threat-report\/"},{"key":"e_1_3_2_1_39_1","unstructured":"Team Cymru. 2023. Unwanted Traffic Removal Service. https:\/\/www.team-cymru.com\/ddos-mitigation-services"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2390317.2390321"},{"key":"e_1_3_2_1_41_1","volume-title":"DDoS Attack Trends","year":"2022","unstructured":"DDoS-Guard. 2023. DDoS Attack Trends in 2022. https:\/\/ddos-guard.net\/en\/blog\/ddos-attack-trends-2022"},{"key":"e_1_3_2_1_42_1","volume-title":"DDoS-Guard Analytical Report on DDoS Attacks for","year":"2022","unstructured":"DDoS-Guard. 2023. DDoS-Guard Analytical Report on DDoS Attacks for 2022. https:\/\/ddos-guard.net\/info\/protect?id=40954"},{"key":"e_1_3_2_1_43_1","volume-title":"Computer Networks","volume":"222","author":"de Neira Anderson Bergamini","year":"2023","unstructured":"Anderson Bergamini de Neira, Burak Kantarci, and Michele Nogueira. 2023. Distributed denial of service attack prediction: Challenges, open issues and opportunities. Computer Networks, Vol. 222 (Jan 2023), 1--27. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1389128622005874"},{"key":"e_1_3_2_1_44_1","unstructured":"Homeland Security Department. 2024. Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) Reporting Requirements. https:\/\/www.federalregister.gov\/documents\/2024\/04\/04\/2024-06526\/cyber-incident-reporting-for-critical-infrastructure-act-circia-reporting-requirements"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3281411.3281413"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2003.10.003"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517745.3561419"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","unstructured":"W. Eddy. 2007. TCP SYN Flooding Attacks and Common Mitigations. RFC 4987. IETF. https:\/\/doi.org\/10.17487\/RFC4987","DOI":"10.17487\/RFC4987"},{"key":"e_1_3_2_1_49_1","unstructured":"Elliott Peterson and Cameron Schroeder. 2023. Dismantling DDoS: Lessons in Scaling. https:\/\/www.blackhat.com\/us-23\/briefings\/schedule\/#dismantling-ddos-lessons-in-scaling-31408"},{"key":"e_1_3_2_1_50_1","unstructured":"European Commission. 2022. Reglation of the European Parliament and of the Council on horizontal cybersecurity requirements for products with digital elements and amending Regulation (EU) 2019\/1020. https:\/\/digital-strategy.ec.europa.eu\/en\/library\/cyber-resilience-act"},{"key":"e_1_3_2_1_51_1","unstructured":"European Union. 2021. The NIS2 Directive: A high common level of cybersecurity in the EU. https:\/\/www.europarl.europa.eu\/thinktank\/en\/document\/EPRS_BRI(2021)689333."},{"key":"e_1_3_2_1_52_1","unstructured":"EUROPOL. 2022. Global crackdown against DDoS services shuts down most popular platforms. https:\/\/www.europol.europa.eu\/media-press\/newsroom\/news\/global-crackdown-against-ddos-services-shuts-down-most-popular-platforms"},{"key":"e_1_3_2_1_53_1","volume-title":"F5 DDoS Attack Trends","year":"2023","unstructured":"F5. 2023. F5 DDoS Attack Trends 2023. https:\/\/www.f5.com\/labs\/articles\/threat-intelligence\/2023-ddos-attack-trends"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3376682"},{"key":"e_1_3_2_1_55_1","unstructured":"Fastly. 2023. Cyber 5 Threat Insights. https:\/\/www.fastly.com\/blog\/cyber-5-threat-insights"},{"key":"e_1_3_2_1_56_1","unstructured":"Fastly. 2023. What Is a DDoS Attack? https:\/\/www.fastly.com\/learning\/what-is-a-ddos-attack"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423658"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","unstructured":"P. Ferguson and D. Senie. 2000. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. RFC 2827. IETF. https:\/\/doi.org\/10.17487\/RFC2827","DOI":"10.17487\/RFC2827"},{"key":"e_1_3_2_1_59_1","unstructured":"FORTINET. 2023. Global Threat Landscape Report. https:\/\/global.fortinet.com\/lp-en-ap-2023globalthreatlandscape-H1"},{"key":"e_1_3_2_1_60_1","unstructured":"Future Market Insights (FMI). 2023. DDoS Protection Market. https:\/\/www.futuremarketinsights.com\/reports\/ddos-protection-market"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623144"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3229598.3229606"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131379"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2014.06.002"},{"key":"e_1_3_2_1_65_1","volume-title":"IFIP Networking","author":"Griffioen Harm","unstructured":"Harm Griffioen and Christian Doerr. 2020. Quantifying TCP SYN DDoS Resilience: A Longitudinal Study of Internet Services. In IFIP Networking. IEEE, Piscataway, NJ, USA, 217--225."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484747"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","unstructured":"Yuhei Hayashi Meiling Chen and Li Su. 2023. Use Cases for DDoS Open Threat Signaling (DOTS) Telemetry. RFC 9387. https:\/\/doi.org\/10.17487\/RFC9387","DOI":"10.17487\/RFC9387"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-72582-2_16"},{"key":"e_1_3_2_1_69_1","volume-title":"Proc. of 31st USENIX Security Symposium. USENIX Association","author":"Hiesgen Raphael","year":"2022","unstructured":"Raphael Hiesgen, Marcin Nawrocki, Alistair King, Alberto Dainotti, Thomas C. Schmidt, and Matthias W\u00e4hlisch. 2022. Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope. In Proc. of 31st USENIX Security Symposium. USENIX Association, Berkeley, CA, USA, 431--448. https:\/\/www.usenix.org\/system\/files\/sec22-hiesgen.pdf"},{"key":"e_1_3_2_1_70_1","volume-title":"Proc. of Network Traffic Measurement and Analysis Conference (TMA)","author":"Hiesgen Raphael","year":"2022","unstructured":"Raphael Hiesgen, Marcin Nawrocki, Thomas C. Schmidt, and Matthias W\u00e4hlisch. 2022. The Race to the Vulnerable: Measuring the Log4j Shell Incident. In Proc. of Network Traffic Measurement and Analysis Conference (TMA) (Enschede, Netherlands). IFIP, Laxenburg, MD, Austria, 1--9."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3234200.3234209"},{"key":"e_1_3_2_1_72_1","volume-title":"Global DDoS Attack Status and Trend Analysis","year":"2022","unstructured":"Huawei. 2023. Global DDoS Attack Status and Trend Analysis in 2022. https:\/\/e.huawei.com\/en\/material\/networking\/security\/0c561b8fd2d342999cd402bcecf6d452"},{"key":"e_1_3_2_1_73_1","volume-title":"Landscape Report","year":"2023","unstructured":"Imperva. 2023. The Imperva Global DDoS Threat Landscape Report 2023. https:\/\/www.imperva.com\/resources\/resource-library\/reports\/ddos-threat-landscape-report-2023\/"},{"key":"e_1_3_2_1_74_1","unstructured":"International Telecommunications Union (ITU). 2003. X.805: Security architecture for systems providing end-to-end communications. https:\/\/www.itu.int\/rec\/T-REC-X.805-200310-I\/en"},{"key":"e_1_3_2_1_75_1","unstructured":"John Kristoff. 2015. An Internet-wide BGP RTBH service."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131383"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278571"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987487"},{"key":"e_1_3_2_1_79_1","volume-title":"Kapersky DDoS Attacks in Q2","year":"2022","unstructured":"Kaspersky. 2022. Kapersky DDoS Attacks in Q2 2022. https:\/\/securelist.com\/ddos-attacks-in-q2-2022\/107025\/"},{"key":"e_1_3_2_1_80_1","volume-title":"Kapersky DDoS Attacks in Q3","year":"2022","unstructured":"Kaspersky. 2022. Kapersky DDoS Attacks in Q3 2022. https:\/\/securelist.com\/ddos-report-q3-2022\/107860\/"},{"key":"e_1_3_2_1_81_1","volume-title":"Kaspersky DDoS Report in Q1","year":"2022","unstructured":"Kaspersky. 2022. Kaspersky DDoS Report in Q1 2022. https:\/\/securelist.com\/ddos-attacks-in-q1-2022\/106358\/"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-72582-2_17"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355590"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26362-5_28"},{"key":"e_1_3_2_1_85_1","unstructured":"John Kristoff. 2022. The DDoS Threat Landscape Report (NANOG 86). https:\/\/storage.googleapis.com\/site-media-prod\/meetings\/NANOG86\/4488\/20221017_Kristoff_The_2022H1_Ddos_v1.pdf"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978293"},{"key":"e_1_3_2_1_87_1","volume-title":"Proc. of the RAID,","author":"Krupp Johannes","unstructured":"Johannes Krupp, Mohammad Karami, Christian Rossow, Damon McCoy, and Michael Backes. 2017. Linking Amplification DDoS Attacks to Booter Services. In Proc. of the RAID,, Marc Dacier, Michael Bailey, Michalis Polychronakis, and Manos Antonakakis (Eds.). Springer International Publishing, Cham, 427--449."},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP51992.2021.00036"},{"key":"e_1_3_2_1_89_1","unstructured":"Mirjam K\u00fchne and John Kristoff. 2014. NTP Reflections. https:\/\/labs.ripe.net\/author\/mirjam\/ntp-reflections\/"},{"key":"e_1_3_2_1_90_1","volume-title":"Proc. of USENIX Security. USENIX Association","author":"K\u00fchrer Marc","year":"2014","unstructured":"Marc K\u00fchrer, Thomas Hupperich, Christian Rossow, and Thorsten Holz. 2014. Exit from Hell? Reducing the Impact of Amplification DDoS Attacks. In Proc. of USENIX Security. USENIX Association, Berkeley, CA, USA, 111--125. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/kuhrer"},{"key":"e_1_3_2_1_91_1","volume-title":"Proc. of the USENIX WOOT","author":"K\u00fchrer Marc","year":"2014","unstructured":"Marc K\u00fchrer, Thomas Hupperich, Christian Rossow, and Thorsten Holz. 2014. Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks. In Proc. of the USENIX WOOT (San Diego, CA) (WOOT'14). USENIX Association, Berkeley, CA, USA, 4."},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC5635"},{"key":"e_1_3_2_1_93_1","unstructured":"Black Lotus Labs. 2021. Tracking UDP Reflectors for a Safer Internet. https:\/\/blog.lumen.com\/tracking-udp-reflectors-for-a-safer-internet\/"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2014.2346248"},{"key":"e_1_3_2_1_95_1","unstructured":"LINK11. 2023. LINK11 DDOS-REPORT 2022. https:\/\/www.link11.com\/en\/download\/ddos-report-2022\/#download-detail-form"},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354232"},{"key":"e_1_3_2_1_97_1","unstructured":"Matthew Luckie Ken Keys Ryan Koga Rob Beverly and kc claffy. 2016. Spoofer Source Address Validation Measurement System. http:\/\/spoofer.caida.org"},{"key":"e_1_3_2_1_98_1","unstructured":"Lumen. 2022. Lumen Quarterly DDoS Report Q3 2022. https:\/\/assets.lumen.com\/is\/content\/Lumen\/lumen-quarterly-ddos-report-q3--2022?Creativeid=6f6d4450-a936-4f14-9121-6a7b8f292392"},{"key":"e_1_3_2_1_99_1","unstructured":"Lumen. 2022. Lumen Quarterly DDoS Report Q4 2022. https:\/\/blog.lumen.com\/q4--2022-lumen-ddos-quarterly-report\/"},{"key":"e_1_3_2_1_100_1","unstructured":"M3AAWG. 2017. M3AAWG Initial Recommendations: Arming Businesses Against DDoS Attacks. http:\/\/www.m3aawg.org\/DDoS-Recommendations-Business."},{"key":"e_1_3_2_1_101_1","unstructured":"M3AAWG. 2023. Scholl Receives 2023 M3AAWG J.D. Falk Award for IP Spoofing Mitigation. https:\/\/www.m3aawg.org\/blog\/2023JDFalkAward-TomScholl."},{"key":"e_1_3_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2018.09.001"},{"key":"e_1_3_2_1_103_1","volume-title":"Merit Network","author":"Inc.","year":"2024","unstructured":"Inc. Merit Network. 2024. ORION Network Telescope: Observatory for cyber-Risk Insights and Outages of Networks. Website. https:\/\/www.merit.edu\/initiatives\/orion-network-telescope\/ Last Access: Nov 2023."},{"key":"e_1_3_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.3390\/su14052730"},{"key":"e_1_3_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"e_1_3_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1111\/1745--9133.12649"},{"key":"e_1_3_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/1132026.1132027"},{"key":"e_1_3_2_1_108_1","doi-asserted-by":"publisher","unstructured":"Mortensen et al. 2007. DDoS Open Threat Signaling (DOTS) requirements. RFC 8612. IETF. https:\/\/doi.org\/10.17487\/RFC4987","DOI":"10.17487\/RFC4987"},{"key":"e_1_3_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987446"},{"key":"e_1_3_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487824"},{"key":"e_1_3_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278534"},{"key":"e_1_3_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW51379.2020.00081"},{"key":"e_1_3_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355593"},{"key":"e_1_3_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487840"},{"key":"e_1_3_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487835"},{"key":"e_1_3_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485983.3494872"},{"key":"e_1_3_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP57164.2023.00041"},{"key":"e_1_3_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555050.3569123"},{"key":"e_1_3_2_1_119_1","volume-title":"DDoS Attack Figures from the First Quarter","author":"NBIP.","year":"2023","unstructured":"NBIP. 2023. DDoS Attack Figures from the First Quarter 2023. https:\/\/www.nbip.nl\/wp-content\/uploads\/2023\/04\/NBIP%20-%20Infographic%20-%20DDoS%20data%20-%202023%20Q1.pdf"},{"key":"e_1_3_2_1_120_1","volume-title":"DDoS Attack Figures from the Fourth Quarter","author":"NBIP.","year":"2022","unstructured":"NBIP. 2023. DDoS Attack Figures from the Fourth Quarter 2022. https:\/\/www.nbip.nl\/wp-content\/uploads\/2023\/01\/NBIP%20-%20Infographic%20-%20DDoS%20data%20-%20Q4%202022%20%5BEN%5D.pdf"},{"key":"e_1_3_2_1_121_1","volume-title":"DDoS Attack Figures from the Second Quarter","author":"NBIP.","year":"2023","unstructured":"NBIP. 2023. DDoS Attack Figures from the Second Quarter 2023. https:\/\/www.nbip.nl\/wp-content\/uploads\/2023\/07\/NBIP-Infographic-DDoS-data-Q2-2023-EN.pdf"},{"key":"e_1_3_2_1_122_1","volume-title":"NETSCOUT Threat Intelligence Report 2H","year":"2021","unstructured":"Netscout. 2021. NETSCOUT Threat Intelligence Report 2H 2021. https:\/\/www.netscout.com\/sites\/default\/files\/2022-03\/ThreatReport_2H2021_WEB.pdf"},{"key":"e_1_3_2_1_123_1","unstructured":"Netscout. 2022. TP240PhoneHome Reflection\/Amplification DDoS Attack Vector. https:\/\/www.netscout.com\/blog\/asert\/tp240phonehome-reflectionamplification-ddos-attack-vector"},{"key":"e_1_3_2_1_124_1","volume-title":"5th Anniversary DDoS Threat Intelligence Report: Unveiling the New Threat Landscape. https:\/\/www.netscout.com\/threatreport\/wp-content\/uploads\/2023\/04\/Threat-Report-2H2022.pdf","unstructured":"Netscout. 2023. 5th Anniversary DDoS Threat Intelligence Report: Unveiling the New Threat Landscape. https:\/\/www.netscout.com\/threatreport\/wp-content\/uploads\/2023\/04\/Threat-Report-2H2022.pdf"},{"key":"e_1_3_2_1_125_1","unstructured":"Netscout. 2023. NETSCOUT DDoS Attack Vectors and Methodology. https:\/\/www.netscout.com\/resources\/threat-report\/threat-intelligence-report-ddos-attack-vectors-and-methodology"},{"key":"e_1_3_2_1_126_1","unstructured":"Netscout. 2023. Service Location Protocol (SLP) Reflection\/Amplification Attack Mitigation Recommendations. https:\/\/www.netscout.com\/blog\/asert\/slp-reflectionamplification-ddos-attack-vector"},{"key":"e_1_3_2_1_127_1","unstructured":"Netscout. 2023. Unveiling the New Threat Landscape. https:\/\/www.netscout.com\/threatreport\/ddos-threat-intelligence-report\/"},{"key":"e_1_3_2_1_128_1","unstructured":"NETSCOUT. 2023. Unveiling the New Threat Landscape. https:\/\/web.archive.org\/web\/20230413213001\/https:\/\/www.netscout.com\/threatreport\/ddos-threat-intelligence-report\/#global-defense"},{"key":"e_1_3_2_1_129_1","volume-title":"DDoS Statistical Report for 1HY","author":"NEXUSGUARD.","year":"2023","unstructured":"NEXUSGUARD. 2023. DDoS Statistical Report for 1HY 2023. https:\/\/www.nexusguard.com\/threat-report\/ddos-statistical-report-for-1hy-2023"},{"key":"e_1_3_2_1_130_1","volume-title":"DDoS Statistical Report for","author":"NEXUSGUARD.","year":"2022","unstructured":"NEXUSGUARD. 2023. DDoS Statistical Report for 2022. https:\/\/blog.nexusguard.com\/threat-report\/ddos-statistical-report-for-2022"},{"key":"e_1_3_2_1_131_1","unstructured":"Nimrod Levy and John Schiel and John A Schiel. 2017. Bi-lateral Security Management Framework (aka DDoS peering). https:\/\/pc.nanog.org\/static\/published\/meetings\/NANOG71\/1447\/20171003_Levy_Operationalizing_Isp_v2.pdf."},{"key":"e_1_3_2_1_132_1","volume-title":"Nokia Deepfield Network Intelligence Report DDoS","year":"2021","unstructured":"Nokia. 2022. Nokia Deepfield Network Intelligence Report DDoS in 2021. https:\/\/onestore.nokia.com\/asset\/211059?_ga=2.234339031.813264975.1691960553-1225881009.1691960553"},{"key":"e_1_3_2_1_133_1","unstructured":"Nokia. 2022. The Changing DDoS Threat Landscape. https:\/\/www.nokia.com\/networks\/security\/ddos-security\/the-changing-ddos-threat-landscape\/"},{"key":"e_1_3_2_1_134_1","volume-title":"Intelligence Report","year":"2023","unstructured":"Nokia. 2023. Nokia Threat Intelligence Report 2023. https:\/\/www.nokia.com\/networks\/security-portfolio\/threat-intelligence-report\/"},{"key":"e_1_3_2_1_135_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45719-2_17"},{"key":"e_1_3_2_1_136_1","unstructured":"NSFOCUS. 2023. 2022 Global DDoS Attack Landscape Report. https:\/\/nsfocusglobal.com\/company-overview\/resources\/2022-global-ddos-attack-landscape-report\/"},{"key":"e_1_3_2_1_137_1","article-title":"Enhancing the Performance of Detect DRDoS DNS Attacks Based on the Machine Learning and Proactive Feature Selection (PFS) Model","volume":"49","author":"Nuiaa Riyadh Rahef","year":"2022","unstructured":"Riyadh Rahef Nuiaa, Selvakumar Manickam, Ali Hakem Alsaeedi, and Esraa Saleh Alomari. 2022. Enhancing the Performance of Detect DRDoS DNS Attacks Based on the Machine Learning and Proactive Feature Selection (PFS) Model. IAENG International Journal of Computer Science, Vol. 49, 2 (2022), 14 pages.","journal-title":"IAENG International Journal of Computer Science"},{"key":"e_1_3_2_1_138_1","unstructured":"Central District of California. 2023. SEIZURE WARRANT BY TELEPHONE OR OTHER RELIABLE ELECTRONIC MEANS. United States District Court. https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2023\/05\/Booter-seizure-warrant-Tucows.pdf"},{"key":"e_1_3_2_1_139_1","volume-title":"General statement of policy under section 105Y of the Communications Act","year":"2003","unstructured":"Ofcom. 2003. General statement of policy under section 105Y of the Communications Act 2003. , 43 pages. https:\/\/www.ofcom.org.uk\/__data\/assets\/pdf_file\/0030\/253677\/General-statement-of-policy-under-section-105Y-of-the-Communications-Act-2003.pdf"},{"key":"e_1_3_2_1_140_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3195406"},{"key":"e_1_3_2_1_141_1","volume-title":"Unit 42 INCIDENT RESPONSE REPORT 2022. https:\/\/www.paloaltonetworks.com\/content\/dam\/pan\/en_US\/assets\/pdf\/reports\/2022-unit42-incident-response-report-final.pdf","author":"Alto Palo","year":"2023","unstructured":"Palo Alto. 2023. Unit 42 INCIDENT RESPONSE REPORT 2022. https:\/\/www.paloaltonetworks.com\/content\/dam\/pan\/en_US\/assets\/pdf\/reports\/2022-unit42-incident-response-report-final.pdf"},{"key":"e_1_3_2_1_142_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028794"},{"key":"e_1_3_2_1_143_1","doi-asserted-by":"publisher","DOI":"10.1145\/505659.505664"},{"key":"e_1_3_2_1_144_1","volume-title":"From Botnet Tracking to Intrusion Detection","author":"Provos Niels","unstructured":"Niels Provos and Thorsten Holz. 2008. Virtual Honeypots. From Botnet Tracking to Intrusion Detection 2nd ed.). Addison-Wesley, Upper Saddle River, NJ.","edition":"2"},{"key":"e_1_3_2_1_145_1","unstructured":"Qrator. 2022. Q1 2022 DDoS Attacks and BGP Incidents. https:\/\/blog.qrator.net\/en\/q1--2022-ddos-attacks-and-bgp-incidents_155\/"},{"key":"e_1_3_2_1_146_1","unstructured":"Qrator. 2022. Q2 2022 DDoS attacks and BGP incidents. https:\/\/qratorlabs.medium.com\/q2-2022-ddos-attacks-and-bgp-incidents-efe7e5c1395a"},{"key":"e_1_3_2_1_147_1","unstructured":"Qrator. 2022. Q3 2022 DDoS attacks and BGP incidents. https:\/\/blog.qrator.net\/en\/q3--2022-ddos-attacks-and-bgp-incidents_158\/"},{"key":"e_1_3_2_1_148_1","unstructured":"Qrator. 2023. Q4 2022 DDoS Attacks and BGP Incidents. https:\/\/blog.qrator.net\/en\/q4--2022-ddos-attacks-and-bgp-incidents-report_163\/"},{"key":"e_1_3_2_1_149_1","volume-title":"Analysis Report","year":"2022","unstructured":"Radware. 2023. Radware Global Threat Analysis Report 2022. https:\/\/www.radware.com\/2022-2023-global-threat-analysis-report\/"},{"key":"e_1_3_2_1_150_1","doi-asserted-by":"publisher","unstructured":"Raju Rajan Jim Boyle Arun Sastry Ron Cohen David Durham and Shai Herzog. 2000. The COPS (Common Open Policy Service) Protocol. RFC 2748. https:\/\/doi.org\/10.17487\/RFC2748","DOI":"10.17487\/RFC2748"},{"key":"e_1_3_2_1_151_1","unstructured":"Research and Markets. 2023. Global DDoS Protection & Mitigation Security Market Report to 2027: Players Include CloudFlare Corero DDoS-Guard Fastly and Fortinet. Website. https:\/\/www.prnewswire.com\/news-releases\/global-ddos-protection-mitigation-security-market-report-to-2027-players-include-cloudflare-corero-ddos-guard-fastly-and-fortinet-301752182.html"},{"key":"e_1_3_2_1_152_1","unstructured":"Rich Compton and Thomas Bowlby and Taylor Harris and Pratik Lotia. 2019. eBGP Flowspec Peering for DDoS Mitigation. https:\/\/pc.nanog.org\/static\/published\/meetings\/NANOG75\/1887\/20190219_Compton_Ebgp_Flowspec_Peering_v1.pdf"},{"key":"e_1_3_2_1_153_1","unstructured":"RioRey. 2015. RioRey Taxonomy DDoS V2. 9. https:\/\/static1.squarespace.com\/static\/5548bab5e4b08ecb6652391c\/t\/5d8d0538f8cc9e3295187a76\/1569523017682\/RioRey_Taxonomy_DDoS_V2.9.pdf"},{"key":"e_1_3_2_1_154_1","volume-title":"Proc. of USENIX Security. USENIX Association","author":"Rizvi A S M","year":"2022","unstructured":"A S M Rizvi, Leandro Bertholdo, Jo ao Ceron, and John Heidemann. 2022. Anycast Agility: Network Playbooks to Fight DDoS. In Proc. of USENIX Security. USENIX Association, Boston, MA, 4201--4218. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/rizvi"},{"key":"e_1_3_2_1_155_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23233"},{"key":"e_1_3_2_1_156_1","volume-title":"Schmidt","author":"Ryba Fabrice J.","year":"2015","unstructured":"Fabrice J. Ryba, Matthew Orlinski, Matthias W\u00e4hlisch, Christian Rossow, and Thomas C. Schmidt. 2015. Amplification and DRDoS Attack Defense - A Survey and New Perspectives. Technical Report arXiv:1505.07892. Open Archive: arXiv.org. http:\/\/arxiv.org\/abs\/1505.07892"},{"key":"e_1_3_2_1_157_1","doi-asserted-by":"publisher","DOI":"10.1145\/3629135"},{"key":"e_1_3_2_1_158_1","doi-asserted-by":"publisher","DOI":"10.1145\/3041027.3041031"},{"key":"e_1_3_2_1_159_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405881"},{"key":"e_1_3_2_1_160_1","unstructured":"ShadowServer. 2023. DDoS textbar The Shadowserver Foundation. https:\/\/www.shadowserver.org\/topics\/ddos\/"},{"key":"e_1_3_2_1_161_1","unstructured":"ShadowServer. 2023. The Shadowserver Foundation: Network Reporting. https:\/\/www.shadowserver.org\/what-we-do\/network-reporting\/"},{"key":"e_1_3_2_1_162_1","unstructured":"Shane Alcock and Alistair King. 2010. Corsaro Version 3 flow analysis tools. https:\/\/github.com\/CAIDA\/corsaro3\/."},{"key":"e_1_3_2_1_163_1","volume-title":"Lee","author":"Specht Stephen M.","year":"2004","unstructured":"Stephen M. Specht and Ruby B. Lee. 2004. Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures. In Proc. of the PADS. ISCA, Winona, MN, USA, 543--550."},{"key":"e_1_3_2_1_164_1","unstructured":"Splunk. 2023. Denial-of-Service Attacks: History Techniques & Prevention. https:\/\/www.splunk.com\/en_us\/blog\/learn\/dos-denial-of-service-attacks.html"},{"key":"e_1_3_2_1_165_1","doi-asserted-by":"crossref","unstructured":"K. Sriram D. Montgomery and J. Haas. 2020. BCP 84 RFC 8704: Enhanced Feasible-Path Unicast Reverse Path Forwarding. https:\/\/www.rfc-editor.org\/info\/bcp84","DOI":"10.17487\/RFC8704"},{"key":"e_1_3_2_1_166_1","unstructured":"Microsoft Azure Network Security Team. 2023. 2022 in Review: DDoS Attack Trends and Insights. https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/02\/21\/2022-in-review-ddos-attack-trends-and-insights\/"},{"key":"e_1_3_2_1_167_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2017.7945057"},{"key":"e_1_3_2_1_168_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131389"},{"key":"e_1_3_2_1_169_1","volume-title":"Proc","author":"Tung Tony Miu","unstructured":"Tony Miu Tung, Chenxu Wang, and Jinhe Wang. 2018. Understanding the Behaviors of BGP-based DDoS Protection Services. In Proc. of NSS. Springer International Publishing, Cham, 463--473."},{"key":"e_1_3_2_1_170_1","unstructured":"U.K. Office of Communications (OFCOM). 2023. Automatic compensation: What you need to know. OFCOM. https:\/\/www.ofcom.org.uk\/phones-telecoms-and-internet\/advice-for-consumers\/costs-and-billing\/automatic-compensation-need-know"},{"key":"e_1_3_2_1_171_1","unstructured":"US Attorney's Office. 2023. Federal Authorities Seize 13 Internet Domains Associated with 'Booter' Websites that Offered DDoS Computer Attack Services. https:\/\/www.justice.gov\/usao-cdca\/pr\/federal-authorities-seize-13-internet-domains-associated-booter-websites-offered-ddos"},{"key":"e_1_3_2_1_172_1","unstructured":"U.S. Federal Communication Commission. 2018. Restoring Internet Freedom. 33 FCC Rcd 311 (1)."},{"key":"e_1_3_2_1_173_1","unstructured":"U.S. Federal Communication Commission. 2022. Broadband Consumer Labels. https:\/\/www.fcc.gov\/broadbandlabels."},{"key":"e_1_3_2_1_174_1","unstructured":"T. van den Hout C. Hesselman R. Poortinga R. Yazdani M. Jonker C. Papachristos P. De Lutiis M. Baltatu and B. Rodrigues. 2022. DDoS Clearing House Cookbook CONCORDIA Deliverable D3.6. CONCORDIA. https:\/\/ddosclearinghouse.eu\/cookbook Accessed on 15 July 2023."},{"key":"e_1_3_2_1_175_1","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM52442.2021.9615596"},{"key":"e_1_3_2_1_176_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485385"},{"key":"e_1_3_2_1_177_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544268"},{"key":"e_1_3_2_1_178_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879149"},{"key":"e_1_3_2_1_179_1","unstructured":"Zayo. 2022. A Look at Recent DDoS Attacks and the Cyberattack Landscape in 2022 So Far. https:\/\/www.zayo.com\/resources\/ddos-attack-trends\/"},{"key":"e_1_3_2_1_180_1","volume-title":"Protecting Your Business From Cyber Attacks: The State of DDoS Attacks DDoS (Insights From Q1 & Q2","year":"2023","unstructured":"Zayo. 2023. Protecting Your Business From Cyber Attacks: The State of DDoS Attacks DDoS (Insights From Q1 & Q2, 2023). https:\/\/go.zayo.com\/zayo-ddos-protection-ebook\/"}],"event":{"name":"IMC '24: ACM Internet Measurement Conference","location":"Madrid Spain","acronym":"IMC '24","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 2024 ACM on Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3646547.3688451","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3646547.3688451","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T11:53:10Z","timestamp":1755863590000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3646547.3688451"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,4]]},"references-count":180,"alternative-id":["10.1145\/3646547.3688451","10.1145\/3646547"],"URL":"https:\/\/doi.org\/10.1145\/3646547.3688451","relation":{},"subject":[],"published":{"date-parts":[[2024,11,4]]},"assertion":[{"value":"2024-11-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}