Which of the following is commonly used in a distributed denial of service (ddos) attack?