In which of the following ways does a DDoS attack differ from a spoofing attack?