Using the Explorer Suite to Analyze DDoS Attacks