DoS and DDoS attacks: where they came from, consequences and