To mitigate DoS attacks on a network, what security method should be implemented?