Problem
1. What defenses are possible to prevent an organization's systems being used as intermediaries in a broadcast amplification attack?
2. What do the terms slash dotted and flash crowd refer to? What is the relation between these instances of legitimate network overload and the consequences of a DoS attack?