A denial of service attack is an act of sabotage that attempts to flood a network server or Web server with so many requests for action until it crashes simply cannot handle legitimate requests any longer, causing legitimates users to be denied service.
The attack overwhelms the system’s ability to process web traffic and eventually crashes it.
Denial-of-service attacks can compromise the computers in a network. They can disorganize an organization’s functioning, depending on the nature of the attack.
University security experts were the first to discover the threat of denial of service attacks hiding in the university computer systems. For example, David Dittrich of the University of Washington discovered denial of service program files stored on the university servers’ months before the first widely publicized attacks on E-ecommerce web sites.
Denial of service attacks can be very costly in terms of business lost such as when an e-commerce site is shut down.
The attack, which would typically come from several compromised machine at once, would consumed network bandwidth and use up processing unit cycles on the target machine.
The goal is to stop hosts or networks for communicating in the network or to disrupt network traffic.
The concern would be what is called distributed denial of service attack where take a lot of compromised end systems and flood a server with the intent of making many request or delivering so much traffic to it that it falls off the network.
One of the reasons it takes so long to stop a denial-of-service attack is the hacker sends the bogus traffic using fake IP addresses.
How does ‘Denial of Service’ attack works?
A computer system comprises hardware and software components, aiming to offer a powerful computational tool. These systems play a crucial role across diverse domains, aiding us in numerous tasks. The prevalence of the internet has significantly bolstered the utilization of computers for information sharing and communication. Computer systems empower us to store, process, display, and transmit information. Even in a basic modern computer system, multiple programs are typically required to carry out various functions effectively.
The Most Popular Posts
-
The trash can has been a familiar presence on computer desktops starting with the early Macintosh systems. Unwanted files can be moved t...
-
The utility programs is a type of system software that allows a user to perform maintenance-type tasks, usually related to managing computer...
-
Spreadsheet is a simple worksheet consisting of rows and columns in which any data can be entered. It does calculations and other operation ...
-
Doxxing is the word coined to describe the process of releasing of personally identifying information to the public without their consent. ...
-
CyberCash Inc. was founded in 1994 and is performing secure credit card presentations since April 1995. CyberCash provides a range of commer...
-
-
-
Adenosine diphosphate (ADP) is a key molecule in cellular energy regulation, consisting of adenosine and two phosphate groups. It is central to the cell's ...