Using the service provided by the victim host or the defects in the transmission protocol, the victim host repeatedly sends out specific service requests at high speed, which makes the victim host unable to process all normal requests in time.
< p > This is another paragraph.