Because, the cost to acquire many computers will
be high, attackers generally third-party computers that they can controls through virus or Trojan software. On the other hand, the attackers can use reflector attack [1]; in this kind of attack, attackers send requests to third-party computers pretend that the requests come from the target computer.