denial-of-service attack

(redirected from DOS attack)
Also found in: Dictionary, Wikipedia.

denial-of-service attack

An assault on a network that floods it with so many requests that regular traffic is either slowed or completely interrupted. Unlike a virus or worm, which can cause severe damage to databases, a denial of service attack interrupts network service for some period.

Distributed Attack
A distributed denial-of-service (DDOS) attack can employ hundreds or even thousands of computers that have been previously infected. The computers act as a network of "zombies" working together to send out bogus messages, thereby creating huge volumes of phony traffic.

In 2016, the Dyn DNS system was hammered by a DDOS attack that caused sporadic slowdowns of major sites such as Twitter, Netflix and The New York Times. The zombie traffic reached more than 100 gigabytes per second of bogus messages. See botnet, smurf attack, SYN flood attack, land attack, teardrop attack and Ping of Death.

It's Not a New Phenomenon
In February 2000, computers were activated that had been previously hacked and planted with illicit programs. The unending number of requests caused a denial of service at Yahoo!, eBay, and other websites. (Article headline courtesy of the Philadelphia Inquirer.)
References in periodicals archive ?
Annette Lagman, UP said the SAIS 'has long been secured from any DoS attack from known overseas attackers, but was configured to treat traffic coming from the Philippines as valid and not hostile.
The report documents the increase in DoS attacks over a five-year period and analyzes the impact 273 DoS attacks had on data center availability.
2010) describes DoS attack are realized by people for key security issues and also it is implemented to increases the security threat, protecting systems against DoS attack.
If an attack is generated by a ccess to a computer and its files using either a DoS attack or a DDoS attack.
Most common model types used for DoS attack modelling are mentioned to show why we suggest using mathematical models and what models have already been proposed to be used for modelling different types of DoS attacks.
Hovav and D'Arcy (2003) and Hovav, Andoh-Baidoo and Dhillion (2007) find that the market does not significantly penalize internet companies that experience a DoS attack.
The group has observed that VoIP tools could offer very good cover traffic for DoS attacks because VoIP runs continuous media over IP packets, and the ability to dial in and out of VoIP overlays allows for control of an application via a voice network.
Security strategies for storage networks must take precautions against unauthorized access from the outside, DoS attacks and internal attacks, which comprise 70% of all relevant cases.
This means that many VoIP phones can be tapped by anyone else with a phone on the same network, any individual VoIP phone can be crashed easily and many VoIP network infrastructures are heavily vulnerable to DoS attack.
But no one knows when a similar DoS attack will occur.
A DoS attack essentially floods a system with bogus requests, thereby denying services to legitimate users.