A cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable by flooding the target.