I know there are several types of flooder so to clarify which one I mean, as I do not know its particular name, here is a description of the type:
'This malicious program is designed to send a large number of IP packets to a remote machine. When the program is started, the malicious user is required to enter the IP address of the computer to be attacked, the port to be attacked, a faked sender address, and number of packets to be sent.
This malicious program may cause applications on the server under attack to suffer reduced performance in supporting network connections.'
Just some questions, feel free to state if you cannot answer a question due to some users using this data maliciously:
- How large, in performance terms, could a flooder have on a network?
- If there were several machines flooding one small network could it bring down a firewall or cause the server to crash?
- How do current safeguards against flooders work?
- What would be the effect of using a rotating proxy in conjunction with a flooder?
- Could a flooder potentially bring down defenses of a network?
- Could a flooder allow someone to change the source code of a HTTP page?