Denial-of-service attack
A denial-of-service (DoS) attack is a malicious attempt to disrupt the normal functioning of a target website or network by overwhelming it with a flood of traffic. This is often executed through automated programs that send repeated requests, leading to slow performance or complete inaccessibility. In more severe cases, attackers may employ multiple infected computers in a coordinated assault, known as a distributed denial-of-service (DDoS) attack, which can affect numerous targets simultaneously, including entire Internet service providers.
The motivations behind DoS attacks vary widely, ranging from simple pranks to more serious objectives like corporate sabotage, political protest, and cyber warfare. Hacktivism, in particular, has emerged as a prominent motive where individuals or groups target organizations as a form of protest. The consequences of these attacks can be significant, affecting not only the targeted sites but also the users relying on them.
To protect against DoS attacks, individuals and organizations can implement various security measures, such as firewalls to block suspicious traffic, redesigning network infrastructure, or investing in specialized mitigation devices. Understanding the nature of these attacks is crucial for anyone concerned about the security and accessibility of their online presence.
On this Page
Subject Terms
Denial-of-service attack
A denial-of-service (DoS) attack is an Internet-based attack in which the perpetrator deliberately overloads an individual’s or organization’s web servers by repeatedly accessing them, typically using an automated program. Such attacks generally aim to render a website or computer network inaccessible for a period of time. Perpetrators of denial-of-service attacks also sometimes target entire Internet service providers, affecting numerous websites at once. While some denial-of-service attacks are intended merely to inconvenience or annoy the owners or users of a website or network, such attacks are often used in the contexts of corporate sabotage, computer-based activism (or hacktivism), and cyberwarfare.
![DDoS Stacheldraht attack diagram. By Everaldo Coelho and YellowIcon [LGPL (http://www.gnu.org/licenses/lgpl.html)], via Wikimedia Commons 90558289-100574.jpg](https://imageserver.ebscohost.com/img/embimages/ers/sp/embedded/90558289-100574.jpg?ephost1=dGJyMNHX8kSepq84xNvgOLCmsE2epq5Srqa4SK6WxWXS)
Overview
When an individual connects to a website, his or her computer sends a request to the server on which the site is hosted. The server then responds to this request, sending the information that makes up the requested page. Sometimes, however, too many people attempt to access a website at once, overloading the host server and thus causing the website to load slowly or not at all. DoS attacks purposefully replicate this process, rendering websites or entire networks inaccessible, often for malicious purposes.
DoS attacks are typically carried out using automated programs that send repeated requests to the target site or network, thus causing the server to overload. In many cases, perpetrators of such attacks use computer programs that infect random unsecured computers and run undetected in the background. When the perpetrator initiates a coordinated multicomputer attack, the programs hijack the resources of the computers they have infected and proceed to overload the target website or network. DoS attacks carried out using multiple computers are known as “distributed denial-of-service (DDoS) attacks.” In addition to overloading websites or networks, some DoS attacks seek to crash the operating system of the target server or render a target networking device, such as a router, completely unusable.
DoS and DDos attacks may be carried out for a wide range of purposes. In some cases, perpetrators simply attack websites for their own entertainment; in other instances, attacks serve larger purposes. According to a report released by the computer-security company NSFOCUS, in the first half of 2013, the most common motivation for DDoS attacks was computer-based activism, or hacktivism. Hacker activists often carry out DoS and DDoS attacks as a form of protest against governments, businesses, or organizations. Other major motivations for DDoS attacks included corporate sabotage, with some companies seeking to overload and incapacitate the websites of their competitors, and international cyberwarfare. Frequent targets of DDoS attacks include banks, governments, large corporations, nonprofit organizations, and Internet service providers.
Individuals and organizations seeking to reduce their vulnerability to DoS attacks have several options. In some cases, firewalls can be used to prevent specific Internet Protocol (IP) addresses—numerical addresses that identify particular Internet-connected computers—from accessing a site; this is most helpful when the attack is carried out by an individual or small group rather than a network of hijacked computers. Some companies or institutions may also choose to reevaluate the design of their networks and purchase backup equipment that can be used in the event of a DoS attack. A number of computer-security companies offer DoS/DDoS mitigation devices, which identify and block traffic that is deemed illegitimate.
Bibliography
Andreasson, Kim, ed. Cybersecurity: Public Sector Threats and Responses. Boca Raton: CRC, 2012. Print.
Chaouchi, Hakima, and Maryline Laurent-Maknavicius. Wireless and Mobile Networks Security. Malden: Wiley, 2013. Print.
“Mid-Year DDoS Threat Report 2013.” NSFOCUS. NSFOCUS Information Technology, 2013. Web. 3 Oct. 2013.
Nagesh, H. R., and K. Chandra Sekaran. “Proactive Models for Mitigating Internet Denial-of-Service/Distributed Denial-of-Service Attacks.” Selected Topics in Communication Networks and Distributed Systems. Ed. Sudip Misra, Subhas Chandra Misra, and Isaac Woungang. Hackensack: World Scientific, 2010. Print.
Raghavan, S. V., and E. Dawson, eds. An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks. New Delhi: Springer, 2011. Print.
Reveron, Derek S., ed. Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World. Washington: Georgetown UP, 2012. Print.
Shakarian, Paulo, Jana Shakarian, and Andrew Ruef. Introduction to Cyber-Warfare: A Multidisciplinary Approach. Amsterdam: Kaufmann, 2013. Print.
Trabelsi, Zouheir, et al. Network Attacks and Defenses: A Hands-On Approach. Boca Raton: CRC, 2013. Print.