::Denial-of-service attack
::concepts
{{#invoke:redirect hatnote|redirect}}

In computing, a denial-of-service (DoS) attack is an attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. A distributed denial-of-service (DDoS) is where the attack source is more than one–and often thousands–of unique IP addresses.
Criminal perpetrators of DoS attacks often target sites or services hosted on high-profile web servers such as banks, credit card payment gateways; but motives of revenge, blackmail<ref>{{#invoke:citation/CS1|citation |CitationClass=web }}</ref><ref>{{#invoke:citation/CS1|citation |CitationClass=web }}</ref> or activism<ref>{{#invoke:citation/CS1|citation |CitationClass=web }}</ref> can be behind other attacks.
Denial-of-service attack sections
Intro Symptoms Attack techniques Attack tools Defense techniques Unintentional denial-of-service Side effects of attacks Legality See also References Further reading External links
PREVIOUS: Intro | NEXT: Symptoms |
<< | >> |
Attack::attacks Title::traffic Internet::network Which::packets First::attacker Attacks::victim
{{#invoke:redirect hatnote|redirect}}

In computing, a denial-of-service (DoS) attack is an attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. A distributed denial-of-service (DDoS) is where the attack source is more than one–and often thousands–of unique IP addresses.
Criminal perpetrators of DoS attacks often target sites or services hosted on high-profile web servers such as banks, credit card payment gateways; but motives of revenge, blackmail<ref>{{#invoke:citation/CS1|citation |CitationClass=web }}</ref><ref>{{#invoke:citation/CS1|citation |CitationClass=web }}</ref> or activism<ref>{{#invoke:citation/CS1|citation |CitationClass=web }}</ref> can be behind other attacks.
Denial-of-service attack sections
Intro Symptoms Attack techniques Attack tools Defense techniques Unintentional denial-of-service Side effects of attacks Legality See also References Further reading External links
PREVIOUS: Intro | NEXT: Symptoms |
<< | >> |