denial of service attack

(redirected from DOS attack)
Also found in: Dictionary, Wikipedia.

denial of service attack

An assault on a network that floods it with so many requests that regular traffic is either slowed or completely interrupted. Unlike a virus or worm, which can cause severe damage to databases, a denial of service attack interrupts network service for some period.

Distributed Attack
A distributed denial of service (DDOS) attack can employ hundreds or even thousands of computers that have been previously infected. The computers act as a network of "zombies" working together to send out bogus messages, thereby creating huge volumes of phony traffic.

In 2016, the Dyn DNS system was hammered by a DDOS attack that caused sporadic slowdowns of major sites such as Twitter, Netflix and The New York Times. The zombie traffic reached more than 100 gigabytes per second of bogus messages. See botnet, smurf attack, SYN flood attack, land attack, teardrop attack and Ping of Death.

It's Not a New Phenomenon
In February 2000, computers were activated that had been previously hacked and planted with illicit programs. The unending number of requests caused a denial of service at Yahoo, eBay, and other websites. (Article headline courtesy of the Philadelphia Inquirer.)
References in periodicals archive ?
2010) describes DoS attack are realized by people for key security issues and also it is implemented to increases the security threat, protecting systems against DoS attack.
Most common model types used for DoS attack modelling are mentioned to show why we suggest using mathematical models and what models have already been proposed to be used for modelling different types of DoS attacks.
Now, it's using its flood of incoming phone calls to conduct phone DoS attacks on target phone numbers.
Hovav and D'Arcy (2003) and Hovav, Andoh-Baidoo and Dhillion (2007) find that the market does not significantly penalize internet companies that experience a DoS attack.
The group has observed that VoIP tools could offer very good cover traffic for DoS attacks because VoIP runs continuous media over IP packets, and the ability to dial in and out of VoIP overlays allows for control of an application via a voice network.
Security strategies for storage networks must take precautions against unauthorized access from the outside, DoS attacks and internal attacks, which comprise 70% of all relevant cases.
Repeated tests have revealed susceptibility to both DoS attacks and voice stream interception issues.
And so the zombie metaphor was quickly recognized when applied to the computers generating the DoS attacks.
The existing methods for configuring a network to filter out known DoS attack software, and to recognize some of the traffic patterns associated with a mounting DoS attack usually rely on the computer being attacked to check whether or not incoming information requests are legitimate or not.
lt;p>The third DoS attack involves the controller receiving "certain IP packets" that trigger a "DoS condition," causing the controller to become unresponsive.
A DoS attack can force a computer to reset, restrict communications with users or consume resources such as bandwidth and disk space.
Following a successful launch, the website gained the attention of extortionists who launched the DoS attack when Tew refused to pay a ransom.