Redirected from DoS
A DoS attack is generated in a number of ways. There are three basic areas of attack - the consumption of limited resources, such as bandwidth, disk space or CPU time; alterations to configuration information, such as routing information or registry entries; and the physical disruption of networking components.
The attack on resources has become increasingly popular, mainly through attempts to "flood" a network with excess or spurious packet data over the internet, thereby preventing legitimate traffic.
A Distributed denial-of-service (DDoS) attack, which is a DoS attack where many computers work in unison to attack a target system, has also gained notoriety due to the efficient tools which are available to create and launch such an attack.
One particular variant of a Denial of Service attack on the public Internet is a smurf attack. This attack relies on mis-configured network devices that respond to so-called broadcast addresses[?]. Abusers will send large numbers of IP packets[?] with a faked source address (the source address is set to the address of a victim, such as an IRC server). To combat Denial of Service problems on the Internet, services like the Smurf Amplifier Registry[?] have given Network Service Providers[?] the ability to identify mis-configured networks and take appropriate action such as filtering.
DDoS attacks are comparable to the effect that occurs when a website gets a sudden spike in traffic due to a popular website linking to it which its server cannot handle.
Search Encyclopedia
|
Featured Article
|