How Does DDoS Mitigation Work?