DENIAL OF SERVICE ATTACK TECHNIQUES: ANALYSIS, IMPLEMENTATION AND COMPARISON