A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?
A.
Worm
B.
Smurf
C.
Logic Bomb
D.
Man-in-the-middle