Problem
1. Why do many DoS attacks use packets with spoofed source addresses?
2. What is "backscatter traffic"? Which types of DoS attacks can it provide information on? Which types of attacks does it not provide any information on?
3. Define a distributed denial-of-service (DDoS) attack.