Throughout this chapter, we have seen many tools and strategies to secure our infrastructure against standard attacks better. In some situations, such as when someone purposefully tries to take your service down using denial of service (DoS) attacks or a distributed denial of service (DDoS) attack, this might not be enough.