In the worst case, an adversary manages to utilize
another (or the very same) Cloud Computing system
for hosting his flooding attack application. In that case,
the race in power (as defined in [22]) would play
both Cloud systems off against each other; each Cloud
would provide more and more computational resources
for creating, respectively fending, the flood, until one
of them eventually reaches full loss of availability.