A form of denial of service attack which sets up a number of communication connections. Each connection requires the computer to devote resources to the connection, but after a time resources become so scarce that the performance of the computer that is being connected degrades and it denies any legitimate requests from real users.