DDoS Attack Basics: How to Detect and Prevent Threats