[1] McDowell, Mindi, "Cyber Security Tip ST04-015", United States Computer Emergency Readiness Team
[2] Boyle, Phillip, “Intrusion Detection FAQ: Distributed Denial of Service Attack Tools: trinoo and wintrinoo”, SANS Institute
[3] Loukas, G.; Oke, G., "Protection Against Denial of Service Attacks: A Survey", The Computer Journal 53
[4] Froutan, Paul, "How to defend against DDoS attacks”, Computerworld
[5] Patrikakis, C.; Masikos, M.; Zouraraki, O., "Distributed Denial of Service Attacks", The Internet Protocol Journal 7
[6] Alecrim, Emerson, “Ataques DoS (Denial of Service) e DDoS (Distributed DoS)”, Infowester
[7] Ramneek, Puri, "Bots &; Botnet: An Overview", SANS Institute
[8] "what is a Botnet trojan?", DSL Reports
[9] Bächer, P., Holz, T., Kötter, M., Wicherski, G., “Know your Enemy: Tracking Botnets”, The Honeynet project & Research Alliance
[11]“Defeating DDOS Attacks”, Cisco Guard DDoS Mitigation Appliances (Último aceso em 16/06/2013)
[13]Bernstein, D., “SYN Cookies", Homepage de D. J. Bernstein (Último aceso em 16/06/2013)
[14]“Understading SYN Cookie Protection”, Juniper Networks (Último aceso em 16/06/2013)
[17]Haas, Juergen, "SYN flood - What is a SYN flood" (Último acesso em 18/06/2013)
[18]Rouse, Margaret, "What is SYN flooding" (Último acesso em 18/06/2013)