DDoS Virtual Library

The DDoS Virtual Library presents a collection of open-source summaries from external reports to showcase research and analysis that has directly influenced our initiatives.

We build these libraries with an eye towards affording other researchers ease of use, putting these resources in one central location for interested parties to take advantage of the incredible work that has informed us. If you are an author whose work is listed here and you do not wish it to be listed in our repository, please let us know. We also welcome additional suggestions from readers, and will consider adding further resources as so much of our work has come through crowd sourced collaboration already. Get in touch via [email protected] if you have questions, concerns, or are interested in contributing to this initiative to spread DDoS education internationally.

DDoS Language Translations

As part of our DDoS Translation Project, we are actively developing approaches based on Machine Learning, Machine Translation, and Natural Language Processing to rapidly and accurately translate these DDoS-related documents into other languages. Our goal is to create a centralized site for educational public goods and disseminate this knowledge globally to ensure that DDoS attacks are mitigated. The Institute for Security and Technology has successfully trained an English-to-Mandarin machine translation model. Check out our Mandarin DDoS Virtual Library! Our Hindi and Japanese DDoS Virtual Libraries are under construction.

DDoS Overview

BITAG Internet of Things (IoT) Security and Privacy Recommendations

Mutually Agreed Norms for Routing Security

MANRS Project Study Report: Black & White Paper 

How Secure are BGP Security Protocols?

Enhancing Resilience of the Internet and Communications Ecosystem

Strategic Principles for Securing the Internet of Things (IoT)

Common DDoS Attack Styles

​Arming Businesses Against DDoS Attacks

Fast and Double Flux Attacks

Reaping the Whirlwind – DDoS Defense in the Age of Mirai

Withstanding the Infinite: DDoS Defense in the Terabit Era

Practical Solutions for Amplification Attacks

When the Sky is Falling: Network-Scale Mitigation of High-Volume  Reflection/Amplification DDoS Attacks

Government Attempts to Remediate

CSRIC Final Report U.S. Anti-Bot Code of Conduct (ABCs) for Internet Service Providers (ISPs)

Enhancing the Resilience of the Internet and Communications Ecosystem Against Botnets and Other Automated, Distributed Threats (May 2018)

A Road Map Toward Resilience Against Botnets (November 2018)

NSTAC Report to the President on Internet and Communications Resilience

NSTAC Report to the President on a Cybersecurity Moonshot (November 2018)

CSDE International Anti-Botnet Guide (November 2018)

Council on Foreign Relations’ Zero Botnets Report (November 2018) 

CSDE International Botnet and IOT Security Guide 2020

Mitigation, Remediation, and Response Strategies

CSCC Industry Technical White Paper

How to Respond to a DDoS Attack (Service Provider Edition)

Bi-Lateral Security Management Framework (a.k.a. DDoS peering) Port Blocking

​DDoS Open Threat Signaling (DOTS) Working Group Use Cases

DDoS Open Threat​ Signaling (DOTS) Working Group Operational Requirements

​Operationalizing ISP Cooperation During DDoS Attacks

DDoS Open Threat Signaling

DDoS Mitigation – ​Using BGP Flowspec

AWS Best Practices for DDoS Resiliency

CSRIC Remediation of Server‐Based DDoS Attacks

BCP 38 – Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing

F5 DDoS Protection: Recommended Practices

Further DDoS Readings

Cybersecurity Canon

IETF Datatracker DDoS Open Threat Signaling (DOTS)

NIST National Initiative for Cybersecurity Education (NICE)