This article discusses the state of DDoS attacks and their major sources. It also explains various strategies and suggests best practices for defending against DDoS attacks.