A SYN Flood sends a large number of SYN requests (the first step in creating a new TCP connection). After this the attacker ignores the ACK which is sent back from the server and simply sends another SYN. The goal is to overload the server with huge number of open TCP connections. By doing so the server will not be able to respond to valid traffic from normal users - thus resulting in a Denial of Service (DOS).
A SYN flood is a form of denial-of-service attack in which an attacker rapidly initiates a connection to a server without finalizing the connection The server has to spend resources waiting for half-opened connections, which can consume enough resources to make the system unresponsive to legitimate trafficThe packet that the attacker sends is the SYN packet, a part of TCP's three-way handshake used to establish a connection