A denial of service attack is an act of sabotage that attempts to flood a network server or Web server with so many requests for action until it crashes simply cannot handle legitimate requests any longer, causing legitimates users to be denied service.
The attack overwhelms the system’s ability to process web traffic and eventually crashes it.
Denial-of-service attacks can compromise the computers in a network. They can disorganize an organization’s functioning, depending on the nature of the attack.
University security experts were the first to discover the threat of denial of service attacks hiding in the university computer systems. For example, David Dittrich of the University of Washington discovered denial of service program files stored on the university servers’ months before the first widely publicized attacks on E-ecommerce web sites.
Denial of service attacks can be very costly in terms of business lost such as when an e-commerce site is shut down.
The attack, which would typically come from several compromised machine at once, would consumed network bandwidth and use up processing unit cycles on the target machine.
The goal is to stop hosts or networks for communicating in the network or to disrupt network traffic.
The concern would be what is called distributed denial of service attack where take a lot of compromised end systems and flood a server with the intent of making many request or delivering so much traffic to it that it falls off the network.
One of the reasons it takes so long to stop a denial-of-service attack is the hacker sends the bogus traffic using fake IP addresses.
How does ‘Denial of Service’ attack works?
A computer system comprises hardware and software components, aiming to offer a powerful computational tool. These systems play a crucial role across diverse domains, aiding us in numerous tasks. The prevalence of the internet has significantly bolstered the utilization of computers for information sharing and communication. Computer systems empower us to store, process, display, and transmit information. Even in a basic modern computer system, multiple programs are typically required to carry out various functions effectively.
The Most Popular Posts
-
Accuracy of a computer is consistently high and the degree of accuracy of a particular computer depends on the instructions and the type of ...
-
Much of the world runs on computers and computers profoundly changed human life mostly for better. What is the characteristics for computer:...
-
The utility programs is a type of system software that allows a user to perform maintenance-type tasks, usually related to managing computer...
-
When all the circuitry for a digital computer is contained on one integrated circuit, the unit is called a microcomputer. Even though ther...
-
Computer is versatile in nature. Multi-processing features of computer makes it quiet versatile in nature. It can control a variety of job...