<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/aws-best-practices-ddos-resiliency.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/are-you-well-architected.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/introduction-denial-of-service-attacks.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/infrastructure-layer-attacks.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/udp-reflection-attacks.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/syn-flood-attacks.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/tcp-middlebox-reflection.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/application-layer-attacks.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/mitigation-techniques.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/best-practices-for-ddos-mitigation.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/infrastructure-layer-defense-bp1-bp3-bp6-bp7.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/amazon-ec2-with-auto-scaling-bp7.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/elastic-load-balancing-bp6.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/use-aws-edge-locations-for-scale-bp1-bp3.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/web-application-delivery-at-the-edge-bp1.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/protect-network-traffic-further-from-your-origin-using-aws-global-accelerator-bp1.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/domain-name-resolution-at-the-edge-bp3.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/using-route53-for-dns-availability.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/configuring-route53-for-cost-protection-from-nxdomain-attacks.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/application-layer-defense-bp1-bp2.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/detect-and-filter-malicious-web-requests-bp1-bp2.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/cloudfront.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/aws-waf.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/aws-waf-rate-based-rules.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/aws-waf-ip-reputation.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/aws-waf-intelligent-threat-mitigation.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/automatically-mitigate-application-layer-ddos-events-bp1-bp2-bp6.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/engage-srt-shield-advanced-subscribers-only.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/attack-surface-reduction.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/obfuscating-aws-resources-bp1-bp4-bp5.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/security-groups-and-network-acls-bp5.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/protecting-your-origin-bp1-bp5.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/protecting-api-endpoints-bp4.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/operational-techniques.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/load-testing.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/metrics-and-alarms.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/logging.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/visibility-and-protection-management-across-multiple-accounts.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/incident-response-strategyrunbooks.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/support.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/conclusion.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/contributors.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/further-reading.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/document-revisions.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/notices.html</loc>
   </url>
   <url>
      <loc>https://docs.aws.amazon.com/zh_cn/whitepapers/latest/aws-best-practices-ddos-resiliency/glossary.html</loc>
   </url>
</urlset>
