Definition of Network Flood on an UnMetered Line

Definition of Network Flood/ UnMetered Line Abuse


In computing, a denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. As clarification, DDoS (Distributed Denial of Service) attacks are sent by two or more persons, or bots DoS (Denial of Service) attacks are sent by one person or system.

Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers. This technique has now seen extensive use in certain games, used by server owners, or disgruntled competitors on games. Increasingly, DoS attacks have also been used as a form of resistance. Richard Stallman has stated that DoS is a form of 'Internet Street Protests’.[1] The term is generally used relating to computer networks, but is not limited to this field; for example, it is also used in reference to CPU resource management.[2]

One common method of attack involves saturating the target machine with external communications requests, so much so that it cannot respond to legitimate traffic, or responds so slowly as to be rendered essentially unavailable. Such attacks usually lead to a server overload. In general terms, DoS attacks are implemented by either forcing the targeted computer(s) to reset, or consuming its resources so that it can no longer provide its intended service or obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately.

The above is taken directly from Wikipedia to better help anyone understand what Network Flooding is.

Denial-of-service attacks are considered violations of the Internet Architecture Board's Internet proper use policy, and also violate the acceptable use policies of virtually all Internet service providers. They also commonly constitute violations of the laws of individual nations.

If your server is found to be Flooding our Network, we Null Route your IP, and immediately terminate your service. If any damage is done to any of Host NIT Inc's equipment as a result of your "Flood" you will be held responsible for any and all charges.


Anyone that has UnMetered or "Unlimited" Bandwidth is not exempted from this. We will first contact you and request that you get the adequate protection for your servers, or your server(s) will be terminated without refund.

In the event that you advise us the issue is resolved and we later find out it'd not, you will be responsible for all charges/credits Host NIT Inc. incurs for other users on the same switch.

DDos Attack and Flooding the network on purpose are two different matter. If you are ever contacted for this matter and sent to read this document, you have acknowledged that Host NIT Inc will monitor your server(s) via KVM, SSH, or RDP. If you are found to be Flooding the network by inappropriate use of our server(s), you will be fined, terminated and denied service now and in the future.

Article Posted By:

Rishi Padooman
President and Founder of Host NIT Inc.

  • 457 Users Found This Useful
Was this answer helpful?

Related Articles

Getting an IP Blacklisted

To get an IP blacklisted is a very serious offense.   This article applies to all...

Host NIT Support Guarantee

Host NIT Support Guarantee 24x7x365 Support Coverage Installation of basic 3rd Party...

Unmetered Bandwidth Explained

Unmetered?? What does it mean? Unmetered simply means that we will not cut you off at any point,...

Mailing Lists Servers and Accounts

Servers that are used exclusively for mailing lists are strictly Forbidden. Host NIT Inc. does...

AUP - Acceptable Use Policy

This Acceptable Use Policy (“AUP”) governs your use of the Services and is incorporated by...