The landscape of distributed denial-of-service attacks is constantly changing, and so is the toolkit available to those who orchestrate them. Current DDoS perpetrators have a extensive range of tools at their command, far beyond the simple flood attacks of the past. These methods can range from readily available, low-cost botnet services – permit