Which of the following are effective protective or countermeasures against a distributed denial-of-service attack?