DDoS attacks: Understanding and Get Through