“ We will explore various mitigation options for DDoS attacks in this article. This includes network configuration, the cost of mitigation solutions, and effects of implementing mitigation strategies on service inaccessibility. ”