Which of the following applications can help determine whether a denial-of-service attack is occurring against a network host?