With nearly every major threat to information security, it is not long before security experts ask the question, “Can the threat play a role in distributed denial of service (DDoS) attacks?” When it ...