DDoS Attacks: What They Are, and How to Defend Against Them