A denial of service attack is an act of sabotage that attempts to flood a network server or Web server with so many requests for action until it crashes simply cannot handle legitimate requests any longer, causing legitimates users to be denied service.
The attack overwhelms the system’s ability to process web traffic and eventually crashes it.
Denial-of-service attacks can compromise the computers in a network. They can disorganize an organization’s functioning, depending on the nature of the attack.
University security experts were the first to discover the threat of denial of service attacks hiding in the university computer systems. For example, David Dittrich of the University of Washington discovered denial of service program files stored on the university servers’ months before the first widely publicized attacks on E-ecommerce web sites.
Denial of service attacks can be very costly in terms of business lost such as when an e-commerce site is shut down.
The attack, which would typically come from several compromised machine at once, would consumed network bandwidth and use up processing unit cycles on the target machine.
The goal is to stop hosts or networks for communicating in the network or to disrupt network traffic.
The concern would be what is called distributed denial of service attack where take a lot of compromised end systems and flood a server with the intent of making many request or delivering so much traffic to it that it falls off the network.
One of the reasons it takes so long to stop a denial-of-service attack is the hacker sends the bogus traffic using fake IP addresses.
How does ‘Denial of Service’ attack works?
A computer system comprises hardware and software components, aiming to offer a powerful computational tool. These systems play a crucial role across diverse domains, aiding us in numerous tasks. The prevalence of the internet has significantly bolstered the utilization of computers for information sharing and communication. Computer systems empower us to store, process, display, and transmit information. Even in a basic modern computer system, multiple programs are typically required to carry out various functions effectively.
The Most Popular Posts
-
In the years since the first WWW applications were developed, there has been an explosion in the global use of the internet. With this growt...
-
Nowadays shoppers can buy online at their convenience at any time and from anywhere. The World Wide Web provides the basic communication inf...
-
Spreadsheet is a simple worksheet consisting of rows and columns in which any data can be entered. It does calculations and other operation ...
-
The trash can has been a familiar presence on computer desktops starting with the early Macintosh systems. Unwanted files can be moved t...
-
When all the circuitry for a digital computer is contained on one integrated circuit, the unit is called a microcomputer. Even though ther...
-
-
The *Auspicious Incident* (*Vaka-i Hayriye*) refers to the dramatic destruction of the Ottoman Janissary corps by Sultan Mahmud II on June 15, 1826. Thou...