Practical Approaches to Dealing with DDoS Attacks