Any system providing TCP-based network services is potentially subject to this attack. The
attackers use half-open connections to cause the server exhaust its resource to keep the
information describing all pending connections. The result would be system crash or system
inoperative