On the Feasibility of Rerouting Based DDoS Defenses