Flooding is a routing technique in which information to be routed, received from a router, is sent to all connected routing devices. To contain the large number of vagabonding data packets, a hop counter can be implemented in the header of the data packet, which is decremented at each hop until it reaches the value 0 and the data packet is eliminated. Flooding is similar to a broadcast function, but it applies to the intermediate systems rather than the end devices.
- In Denial of Service (DoS) and Distributed Denial of Service (DDoS), different flooding techniques are used to attack the network services. All flooding techniques overload the available processing capacity of the attacked party so that the attacked server can no longer process the requests. A distinction is made between PING flooding and SYN flooding. In the case of ping flooding or ping of death (PoD), long requests or excessively long fragments are generated to an IP address, which require the entire system performance. In SYN flooding, requests for synchronization are continuously sent to a TCP port. This also overloads the system and can cause it to crash.
- In unstructured peer-to-peer networks, the flooding technique is used for search requests. Since in peer-to-peer networks only the end system has information about stored data, search requests are solved by flooding by directing the request to all connected end systems.