8 Procedures to Battle DDOS Assaults