Denial of assistance: the attacker exhausts the resources needed to deliver solutions to reputable end users. Spoofing id: an attacker might gain entry to the process by pretending to get a licensed program consumer. For that reason, corporations should really purpose to determine and solve threats for the early stages https://ieeexplore.ieee.org/document/9941250