The only mitigation technique that makes sense versus these kind of attacks is to block them at the edge or core network or simply for the carrier by now.There are many other ways to virtualize a bare-metal server to turn it into a host method (1Gbps port speed or much better recommended as well as a redundant RAID-ten array and colocation to maint