Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Finding Optimal Set of Countermeasure using a Greedy Algorithm