The landscape of distributed denial-of-service assaults is constantly developing, and so is the arsenal available to those who launch them. Modern DDoS perpetrators have a wide range of tools at their command, far beyond the simple flood attacks of the past. These techniques can range from readily available, low-cost botnet services – permitting