A hands on look at analyzing DDoS attacks and building patterns necessary to identify attack traffic from legitimate users. The focus will be on full packet capture tools like Wireshark, pre-attack baseline profiling, and technical incident response surrounding these issues.