Actions

::Denial-of-service attack

::concepts



{{#invoke:redirect hatnote|redirect}}

DDoS Stacheldraht attack diagram.

In computing, a denial-of-service (DoS) attack is an attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. A distributed denial-of-service (DDoS) is where the attack source is more than one–and often thousands–of unique IP addresses.

Criminal perpetrators of DoS attacks often target sites or services hosted on high-profile web servers such as banks, credit card payment gateways; but motives of revenge, blackmail<ref>{{#invoke:citation/CS1|citation |CitationClass=web }}</ref><ref>{{#invoke:citation/CS1|citation |CitationClass=web }}</ref> or activism<ref>{{#invoke:citation/CS1|citation |CitationClass=web }}</ref> can be behind other attacks.


Denial-of-service attack sections
Intro  Symptoms  Attack techniques  Attack tools  Defense techniques  Unintentional denial-of-service  Side effects of attacks  Legality  See also  References  Further reading  External links  

PREVIOUS: IntroNEXT: Symptoms
<<>>

Attack::attacks    Title::traffic    Internet::network    Which::packets    First::attacker    Attacks::victim

{{#invoke:redirect hatnote|redirect}}

DDoS Stacheldraht attack diagram.

In computing, a denial-of-service (DoS) attack is an attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. A distributed denial-of-service (DDoS) is where the attack source is more than one–and often thousands–of unique IP addresses.

Criminal perpetrators of DoS attacks often target sites or services hosted on high-profile web servers such as banks, credit card payment gateways; but motives of revenge, blackmail<ref>{{#invoke:citation/CS1|citation |CitationClass=web }}</ref><ref>{{#invoke:citation/CS1|citation |CitationClass=web }}</ref> or activism<ref>{{#invoke:citation/CS1|citation |CitationClass=web }}</ref> can be behind other attacks.


Denial-of-service attack sections
Intro  Symptoms  Attack techniques  Attack tools  Defense techniques  Unintentional denial-of-service  Side effects of attacks  Legality  See also  References  Further reading  External links  

PREVIOUS: IntroNEXT: Symptoms
<<>>