Using inherent command and control vulnerabilities to halt DDoS attacks | IEEE Conference Publication | IEEE Xplore