Utilizing a Zero Trust Model to Defend IoT Driven DDoS Cyber Attacks