Discovering DoS and DDoS attacks