In Security attacks how do you classify a SYN Flooding atack?
DOS attacks
Cryptanalysis
Social Engineering
repudiation attack