Study the following log extract and identify the attack.
What type of Denial of Service attack is represented here?