Mia, a malicious hacker, sends fragmented HTTP requests to the target webserver, aiming to overwhelm the server's maximum concurrent connection pool. Her goal is to ensure that any additional connection attempts beyond the limit are denied. What type of attack is Mia executing?