Which of the following techniques should be used to mitigate DDoS attacks in the data center access layer?