This attack is similar to the pingflood attack but with a clever modification to the process.
这种攻击类似于 ping 洪水攻击,但它能巧妙地修改进程。
2
At the low end, a pingflood can be used to uncover information covertly, but throttle up the packets being sent to a target or victim so that now, the system will go offline or suffer slowdowns.