There are two sides to every coin. And this applies to the distributed denial-of-service attack story as well. So far in this photo-story, we have explored various DDoS attack tools that attackers might use on targets. Now what if you are at the receiving end? What are the ways to mitigate DDoS threats? Are your resources being used to DDoS other networks? Are you being made part of the botnet? Let’s address these issues in the following slides.