Distributed Dos Attacks Explained