A denial-of-service attack (DoS) (also called an availability attack) is
|“||one in which an attack from a single source overwhelms a target computer with messages, denying access to legitimate users without actually having to compromise the targeted computer.||”|
|“||[a] method of attack that denies system access to legitimate users without actually having to compromise the targeted system. From a single source, the attack overwhelms the target computers with messages and blocks legitimate traffic. It can prevent one system from being able to exchange data with other systems or prevent the system from using the Internet.||”|
|“||attempts to prevent legitimate users from accessing a resource — in this case a network or website. This is most commonly done by "flooding" a network with information and overloading the server with so many requests for information that it cannot process other, legitimate requests.||”|
|“||involves flooding a targeted system with incoming, useless traffic with the goal of making the attacked network unavailable to its intended users.||”|
How it works Edit
There are two types of denial-of-service attacks. The first type of attack attempts to damage or destroy computer resources. The second type of attack overloads some system service or exhausts some resource, thus preventing others from using that service.
Viruses and worms are commonly used to launch denial-of-service attacks, which generally flood targeted networks and systems with so much data transmission that regular traffic is either slowed or completely interrupted. Such attacks have been utilized ever since the groundbreaking Morris worm, which brought 10% of the systems connected to the Internet to a halt in November 1988. In 2001, the Code Red worm used a denial-of-service attack to affect millions of computer users by shutting down websites, slowing Internet service, and disrupting business and government operations.
Denial-of-service attacks are very common on the Internet. Malicious attackers shut down websites, reboot computers, or clog networks with junk packets. DOS attacks can be very serious, especially when the attacker is clever enough to launch an ongoing, untraceable attack. Websites serious about security can launch these same attacks against themselves to determine how much damage can be done.
- ↑ Technology Assessment: Cybersecurity for Critical Infrastructure Protection, at 185 n.17.
- ↑ The Smart Grid and Cybersecurity: Regulatory Policy and Issues, at 8 n.29.
- ↑ Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement, at 3 n.15 (citation omitted).
- ↑ Antitrust Policy Statement on Sharing of Cybersecurity Information, at 7 n.16.