The landscape of distributed denial-of-service attacks is constantly developing, and so is the arsenal available to those who launch them. Current DDoS perpetrators have a extensive range of tools at their disposal, far beyond the simple flood attacks of the past. These techniques can range from readily available, low-cost botnet services – enabl