Protecting your network from DDoS attacks – a practical guide