Barbara is investigating an attack against her network. she notices that the internet control message protocol (icmp) echo replies coming into her network far exceed the icmp echo requests leaving her network. what type of attack is likely taking place?