Watch this video on YouTube
Which type of attack is carried out by flooding a system with useless traffic so that it isn't able to respond to legitimate resource requests?