. . "They target existing security infrastructure, such as firewalls, and can be used to bring down a website or a web service such as email, which can have far-reaching consequences for businesses." . .