The landscape of distributed denial-of-service incidents is constantly evolving, and so is the arsenal available to those who execute them. Contemporary DDoS threat actors have a broad range of tools at their disposal, far past the simple flood attacks of the past. These methods can range from readily available, low-cost botnet services – allowin