ethical-hacker video for the malicious actor Benjamin is attempting to target an IoT device. He plans to utilize multiple false identities to generate a
The malicious actor Benjamin is attempting to target an IoT device. He plans to utilize multiple false identities to generate a convincing illusion of traffic congestion, disrupting communication between adjacent nodes and networks. What type of attack is Benjamin executing?