Your IP: Unknown · Your Status: ProtectedUnprotectedUnknown


Flooder definition

Malware used to send large amounts of garbage data (a “flood”) to the target, disrupting their communications. Flooders are typically deployed over network channels such as IRC, but specialized flooder versions for email, SMS, and instant messaging services also exist.

Flooders should not be confused with network flooding attacks (also known as denial-of-service attacks, or DOS.) Flooders aim to disrupt user communications as an act of cyber vandalism or as a diversionary measure. By contrast, network flooding attacks aim to overwhelm the system with repeat requests and crash it.

Real flooder examples

  • ICQBomber
  • KillZone
  • CriminalMSN
  • IRCKill

Stopping a flooder

  • Use bots to detect floods on communications channels. Most contemporary IRC clients come with scripts that detect and ban flooders.
  • Implement messaging limits on your communications channels to prevent users from spamming.
  • Use reputable antivirus software on your communications server to detect and remove malware that causes flooder attacks.

Further reading

Ultimate digital security

We value your privacy

This website uses cookies to provide you with a safer and more personalized experience. By accepting, you agree to the use of cookies for ads and analytics, in line with our Cookie Policy.