I was wondering if it was possible to disrupt the communication between two parties by sending a large amount of packets with a spoofed source address (HOST A) so that the targeted address (HOST B) would stop responding to the spoofed source address (HOST A).
I'm already aware of TCP RST attacks, but that's not what I'm looking for: I'd like the sequence number, window size, and the likes not to be a necessary acknowledgement for the attack.
What I'm trying to disrupt is an HTTP communication. I'm using Scapy, by the way.