READ
How To Defend Against DDoS Attacks