A broad class of security trheats can be classified as denial-of-service (DoS) attacks.  As the
                                    name suggests, a DoS attack renders a network, host, or other piece of network infrastructure unusable by legitimate users. 
                                    A Dos attack works by creating so much work for the infrastructure under attack that legitimate work cannot be performed. 
                                    In a SYN flooding attack, the attacker deluges a server with TCP SYN packets, each having a spoofed OP source
                                    address.  The server, not being able to differentiate between a lgeitimae SYN and a spooded SYN, completes the second
                                    step of the TCP handshake for a spoofed SYN, allocating data structures and state.  The third step of the three-way handshake
                                    is never completed by the attacker, leaving an ever-incresing number of partically open connections.  The load od SYN
                                    packets to be processed and depletion of free memory eventuyally brings the server to its knees.  A related form of attack
                                    sends IP fragments to a host but nvere sends enough fragments to complete a datagram.  The attacked host continues to
                                    accumulate fragments, waiting in vain for fragments that would complete a datagram, consuming an ever-increasing amountof
                                    storage over time.  A smurf attack operates by having a large number of innocemt hosts respond to ICNP
                                    echo-request packets that contain a spoofed source IP address.  This results in a large number of ICMP echo-reply packets
                                    being sent to the host whoe IP address is being spoofed.  
                                     
                                    In a distributed denial-of-service (DDoS) attack, the first gains access to user accounts on numerous hosts across the
                                    INternet.  The attacker then installs and runs a slave program at each compromised site that quietly waits form commands
                                    from a master program.  Once a large number of such slave programs are running, the master program contacts and instructs
                                    each of them to launch a DoS attack directed at the same target host.  The resulting coordinated attack is particularly
                                    devastating, since it is coming from so many directions at once.
                                     
                                    It is difficult to protect one-self against DoS and DDoS attacks.  Packet filtering is dificult because it is difficult
                                    to distinguish good datagrams from bad ones.  
                                     
                                    A number of recent research efforts have looked at techniques for making IP hearers as they pass through a router in
                                    order to trace back a flow of DoS datagrams to their source.  Once a compomised source host has been identified, it can
                                    be quarantained, although this is uaually a slow process, requiring human intervention.  Solveing a DDoS attack is even
                                    more difficult and time-consuming.