Denial-of-service attack

related topics
{system, computer, user}
{war, force, army}
{law, state, case}
{math, number, function}
{work, book, publish}
{build, building, house}
{group, member, jewish}
{film, series, show}
{island, water, area}
{rate, high, increase}
{black, white, people}
{disease, patient, cell}
{school, student, university}
{company, market, business}
{service, military, aircraft}

A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a person or people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers. The term is generally used with regards to computer networks, but is not limited to this field, for example, it is also used in reference to CPU resource management.[1]

One common method of attack involves saturating the target machine with external communications requests, such that it cannot respond to legitimate traffic, or responds so slowly as to be rendered effectively unavailable. In general terms, DoS attacks are implemented by either forcing the targeted computer(s) to reset, or consuming its resources so that it can no longer provide its intended service or obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately.

Denial-of-service attacks are considered violations of the IAB's Internet proper use policy, and also violate the acceptable use policies of virtually all Internet service providers. They also commonly constitute violations of the laws of individual nations.[2]


Full article ▸

related documents
Access control
Atari 8-bit family
CDC 6600
Short message service
History of the graphical user interface
Integrated Services Digital Network
Embedded system
Border Gateway Protocol
Frame relay
Digital camera
Operational amplifier
History of computing hardware
Palm OS
Internet Explorer
Timeline of computing 1980–1989
Thin client
Compact Disc
Synchronous optical networking
IBM Personal Computer