The landscape of distributed denial-of-service incidents is constantly changing, and so is the toolkit available to those who execute them. Current DDoS threat actors have a wide range of tools at their reach, far beyond the simple flood attacks of the past. These techniques can range from readily available, low-cost botnet services – permitting