Manage capacity, bandwidth, or other redundancy to limit the effects of information flooding types of denial-of-service attacks.