Is a DOS Attack a Weapon?