Log in
Enquire now
Denial-of-service attack

Denial-of-service attack

Cyber attack that involves spamming a network to tie up its resources and make it unusable or inaccessible.

OverviewStructured DataIssuesContributors

Contents

Is a
Industry
Industry

Other attributes

Also Known As
DOS
Wikidata ID
Q131406

Denial of service attacks - (DoS for short) - are a type of cyber attack in which malicious actors will intentionally spam a website / network with a large quantity of illegitimate messages or transactions in order to overwhelm the network and make it inaccessible to those who need it.

DoS attacks are like online traffic jams. Networks and servers are only capable of handling so much traffic at once, just as highways and roads can only handle so many vehicles at once. If you stuff too many vehicles onto the road, none of them can move and traffic grinds to a halt. Likewise, if you exceed the traffic capacity of a network or sever, nobody can access it until the traffic goes back down to supported levels.

History of DoS Attacks

DoS attacks do occur in the real world. A few examples include:

  • University of Illinois - The first ever DoS attack occurred in 1974 at the hands of a 13-year-old high school student named David Dennis. Dennis went to the Computer-Based Education Research Laboratory (CERL) at the University of Illinois and sent the 'ext' command to 31 computers at once, forcing all of the computer's users to shut down and restart their computers.
  • US Banks - 6 banks in the US - including Bank of America, JP Morgan Chase, and Citigroup - were the victims of a DoS attack in 2012. Attackers reached peak traffic volumes of more than 60 gigabits per second.
  • GitHub - In February 2018, the popular code hosting service, GitHub, faced a DoS attack of record-breaking proportions. The max traffic volume reached as high as 1.35 terabits per second.
Distributed Denial of Service (DDoS) Attacks

DoS attacks come from single computers with one internet connection that are specially rigged for the purposes of the attack.

Another variation of DoS attacks is the DDoS (Distributed Denial of Service) attack. In these attacks, there are multiple computers with different IP addresses spamming the target network. DDoS attacks are more difficult to defend against because having multiple IP addresses makes it more difficult to catch the attack with spam filters.

The examples in the History of DoS Attacks section were actually DDoS attacks with numerous coordinated participants.

Legality of DoS and DDoS Attacks

DoS and DDoS attacks are illegal and attackers can be charged with crimes depending on their location. In the US, these attacks violate the Computer Fraud and Abuse Act (CFAA). In the UK, DDoS attacks are outlawed by the Computer Misuse Act of 1990. In the European Union, the Cybercrime Convention Committee has criminalized DDoS attacks as well. Laws exist in many other countries around the world making DDoS attacks .

Timeline

No Timeline data yet.

Companies in this industry

Further Resources

Title
Author
Link
Type
Date

5 Most Famous DDoS Attacks | A10 Networks

https://www.a10networks.com/resources/articles/5-most-famous-ddos-attacks

Web

DDoS Attacks as Fast As Possible

https://www.youtube.com/watch?v=0I4O4hoKzb8

June 2, 2015

The Impact of Denial of Service Attacks

https://www.globalsign.com/en/blog/denial-of-service-in-the-iot/

Web

What is a Distributed Denial-of-Service (DDoS) attack? | Cloudflare

https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/?utm_referrer=https://www.cloudflare.com/

Web

References

Find more entities like Denial-of-service attack

Use the Golden Query Tool to find similar entities by any field in the Knowledge Graph, including industry, location, and more.
Open Query Tool
Access by API
Golden Query Tool
Golden logo

Company

  • Home
  • Press & Media
  • Blog
  • Careers
  • WE'RE HIRING

Products

  • Knowledge Graph
  • Query Tool
  • Data Requests
  • Knowledge Storage
  • API
  • Pricing
  • Enterprise
  • ChatGPT Plugin

Legal

  • Terms of Service
  • Enterprise Terms of Service
  • Privacy Policy

Help

  • Help center
  • API Documentation
  • Contact Us
By using this site, you agree to our Terms of Service.