DDoS attacks and mitigation techniques