There are mitigation techniques the operating system can deploy (resources being used up, for instance, and how they are used and for how long ??? this depends on the type of attack as well, at least what I'm getting at) but it all comes down to the core routers (and more generally how much the network can withstand, bandwidth and other resources).