Fig 9.1
Denial-of-Service attack categories