Unmasking Network Vulnerabilities The Denial of Service Dilemma