The landscape of distributed denial-of-service attacks is constantly evolving, and so is the arsenal available to those who execute them. Contemporary DDoS offenders have a wide range of tools at their disposal, far beyond the simple flood attacks of the past. These methods can range from readily available, low-cost botnet services – enabling eve