8 Approaches to Fight DDOS Assaults