01:58
3. How to detect DOS attack