The malicious hacker Victor is attempting to attack an IoT device by using multiple fake identities to create a false sense of traffic congestion, disrupting communication between neighboring nodes and networks. What type of attack is Victor performing?