DoS Attacks: Latest Trends and Effective Protection Strategies