Watch this video on YouTube
Which attack method involves flooding a network with excessive traffic to shut it down?