An attack that attempts to cause a failure in a system by providing more input than the system can process properly.
Source(s):
CNSSI 4009-2015
from
IETF RFC 4949 Ver 2
An attack in which an attacker sends large numbers of wireless messages at a high rate to prevent the wireless network from processing legitimate traffic.
Source(s):
NIST SP 800-48 Rev. 1
[Withdrawn]
under Flooding