A composable approach to design of newer techniques for large-scale denial-of-service attack attribution