Distributed divide-and-conquer techniques for effective DDoS attack defenses

   Abstract