8 Approaches to Battle DDOS Assaults