A denial of service attack is an act of sabotage that attempts to flood a network server or Web server with so many requests for action until it crashes simply cannot handle legitimate requests any longer, causing legitimates users to be denied service.
The attack overwhelms the system’s ability to process web traffic and eventually crashes it.
Denial-of-service attacks can compromise the computers in a network. They can disorganize an organization’s functioning, depending on the nature of the attack.
University security experts were the first to discover the threat of denial of service attacks hiding in the university computer systems. For example, David Dittrich of the University of Washington discovered denial of service program files stored on the university servers’ months before the first widely publicized attacks on E-ecommerce web sites.
Denial of service attacks can be very costly in terms of business lost such as when an e-commerce site is shut down.
The attack, which would typically come from several compromised machine at once, would consumed network bandwidth and use up processing unit cycles on the target machine.
The goal is to stop hosts or networks for communicating in the network or to disrupt network traffic.
The concern would be what is called distributed denial of service attack where take a lot of compromised end systems and flood a server with the intent of making many request or delivering so much traffic to it that it falls off the network.
One of the reasons it takes so long to stop a denial-of-service attack is the hacker sends the bogus traffic using fake IP addresses.
How does ‘Denial of Service’ attack works?
A computer system comprises hardware and software components, aiming to offer a powerful computational tool. These systems play a crucial role across diverse domains, aiding us in numerous tasks. The prevalence of the internet has significantly bolstered the utilization of computers for information sharing and communication. Computer systems empower us to store, process, display, and transmit information. Even in a basic modern computer system, multiple programs are typically required to carry out various functions effectively.
The Most Popular Posts
-
The integration of computer technology into business organizations has fundamentally reshaped how companies operate, driving efficiency, pro...
-
An Enterprise Information Portal (EIP) is a centralized, digital hub that enables employees within an organization to access a wide array of...
-
The trash can has been a familiar presence on computer desktops starting with the early Macintosh systems. Unwanted files can be moved t...
-
The earliest device that qualifies as a digital computer is the “abacus” also known as “soroban”. Abacus is the simplest form of a digital c...
-
The utility programs is a type of system software that allows a user to perform maintenance-type tasks, usually related to managing computer...