Fig 9.1  Denial-of-Service attack categories