Example 3 – Preventing a SYN Flood attack