Whitepaper : Tailoring DDoS Mitigation to Your Needs