An organization experiences a sudden network outage where no new devices can obtain an IP address from the DHCP server. Upon investigation, the IT team discovers that an attacker has flooded the network with numerous DHCP requests using spoofed MAC addresses, exhausting the available IP pool. What type of attack has occurred?