Attack that attempts to prevent legitimate users from accessing a service by exhausting resources. ← DAG (Directed Acyclic Graph) DID Method →