Theoretical and Experimental Methods for Defending Against DDoS Attacks