According to the capture of the victim host, what kind of attack is this attack?
ARP Flood attack
HTTP Flood attack
ARP spoofing attack
SYN Flood attack
Submit