A denial of service attack where an important resource in a computer system is overloaded. For example, an intruder may create thousands of programs which hog the processor of a computer to the extent that other users experience very slow response times for their programs, or may create so many files that other users cannot store any data.