An organization's web infrastructure has received partial HTTP requests from an attacker. The web server opened multiple connections and waited for the requests to complete. The requests remained in a wait state which caused the target server's maximum concurrent connection pool to fill up and additional connection requests to go unanswered. Identify the attack technique described above.