denial of service attack

(redirected from DOS attack)
Also found in: Dictionary, Wikipedia.

denial of service attack

An assault on a network that floods it with so many requests that regular traffic is either slowed or completely interrupted. Unlike a virus or worm, which can cause severe damage to databases, a denial of service attack interrupts network service for some period.

Distributed Attack
A distributed denial of service (DDOS) attack can employ hundreds or even thousands of computers that have been previously infected. The computers act as "zombies" and work together to send out bogus messages, thereby creating huge volumes of phony traffic. See smurf attack, SYN flood attack, land attack, teardrop attack and Ping of Death.


Hackers Caused a Denial of Service
Computers with high-speed connections to the Internet were hacked and planted with illicit programs that, when activated, sent out an unending number of requests and caused a denial of service at Yahoo, eBay, Amazon.com and other Web sites during the second week of February 2000. (Article headline courtesy of the Philadelphia Inquirer.)
References in periodicals archive ?
2010) describes DoS attack are realized by people for key security issues and also it is implemented to increases the security threat, protecting systems against DoS attack.
Most common model types used for DoS attack modelling are mentioned to show why we suggest using mathematical models and what models have already been proposed to be used for modelling different types of DoS attacks.
Now, it's using its flood of incoming phone calls to conduct phone DoS attacks on target phone numbers.
Hovav and D'Arcy (2003) and Hovav, Andoh-Baidoo and Dhillion (2007) find that the market does not significantly penalize internet companies that experience a DoS attack.
The group has observed that VoIP tools could offer very good cover traffic for DoS attacks because VoIP runs continuous media over IP packets, and the ability to dial in and out of VoIP overlays allows for control of an application via a voice network.
Security strategies for storage networks must take precautions against unauthorized access from the outside, DoS attacks and internal attacks, which comprise 70% of all relevant cases.
Repeated tests have revealed susceptibility to both DoS attacks and voice stream interception issues.
And so the zombie metaphor was quickly recognized when applied to the computers generating the DoS attacks.
The existing methods for configuring a network to filter out known DoS attack software, and to recognize some of the traffic patterns associated with a mounting DoS attack usually rely on the computer being attacked to check whether or not incoming information requests are legitimate or not.
lt;p>The third DoS attack involves the controller receiving "certain IP packets" that trigger a "DoS condition," causing the controller to become unresponsive.
A DoS attack can force a computer to reset, restrict communications with users or consume resources such as bandwidth and disk space.
Following a successful launch, the website gained the attention of extortionists who launched the DoS attack when Tew refused to pay a ransom.