Eight Procedures to Beat DDOS Assaults