Denial-of-Service (DoS) Attack: Examples and Common Targets

What Is a Denial-of-Service (DoS) Attack?

A denial-of-service (DoS) attack is a cyberattack on devices, information systems, or other network resources that prevents legitimate users from accessing expected services and resources.

This is usually accomplished by flooding the targeted host or network with traffic until the target can't respond or crashes. DoS attacks can last from a few hours to many months, costing companies and consumers time and money while their resources and services are unavailable.

Key Takeaways

  • A denial-of-service (DoS) is a form of cyberattack that prevents legitimate users from accessing a computer or network.
  • In a DoS attack, rapid and continuous online requests are sent to a target server to overload the server’s bandwidth.
  • Distributed denial-of-service (DDoS) attacks leverage a wide web of computers or devices infected with malware to launch a coordinated barrage of meaningless online requests, blocking legitimate access.

How Denial-of-Service Attacks Work

DoS attacks are on the rise as businesses and consumers use more digital platforms to communicate and transact with each other.

Cyberattacks are often launched to steal personally identifiable information (PII), causing considerable damage to companies' financial pockets and reputations. Data breaches can target a specific company or a host of companies at the same time. For example, a company with high-security protocols in place may be attacked through a member of its supply chain that has inadequate security measures. When multiple companies have been selected for an attack, the perpetrators can use a DoS approach.

Cyberattacks typically fall into one of three main categories: criminal, personal, or political. Criminally motivated attacks seek financial gain. Personal attacks may occur when a disgruntled current or former employee seeks retribution, steals money or data, or simply wants to disrupt a company's systems. Sociopolitical attackers—aka "hacktivists"—seek attention for their causes.

In a DoS attack, the cyber attackers typically use one internet connection and one device to send rapid and continuous requests to a target server to overload the server’s bandwidth. DoS attackers exploit a software vulnerability in the system and proceed to exhaust the RAM or CPU of the server.

The damage in loss of service a DoS attack does can be fixed in a short time by implementing a firewall with allow/deny rules. Because a DoS attack only has one IP address, the IP address can be easily fished out and denied further access using a firewall. However, there is a type of DoS attack that is not so easy to detect—a distributed denial-of-service (DDoS) attack.

Distributed Denial-of-Service (DDoS) Attack

A common type of DoS attack is the distributed denial-of-service (DDoS) attack. The attacker floods its target with unwanted internet traffic so that normal traffic is unable to reach its intended destination. Hordes of infected, connected devices (e.g., smartphones, PCs, network servers, and Internet of Things devices) from around the world go after a targeted website, network, web application, application programming interface, or data center infrastructure simultaneously to block traffic.

DoS and DDoS attacks can slow or completely stop various online services, including email, websites, ecommerce sites, and other online resources.

The various sources of attack traffic may operate in the form of a botnet. A botnet is a network of personal devices that have been compromised by cybercriminals without the knowledge of the devices' owners.

The hackers infect the computers with malicious software to gain control of the system to send spam and fake requests to other devices and servers. A target server that falls victim to a DDoS attack will experience an overload due to the hundreds or thousands of phony traffic requests that come into it.

Because the server is attacked from multiple sources, detecting all the addresses may prove difficult. Furthermore, separating legitimate traffic from fake traffic may also prove impossible, hence another reason it is hard for a server to withstand a DDoS attack.

Why Are DDoS Attacks Launched?

Unlike most cyberattacks initiated to steal sensitive information, initial DDoS attacks are launched to make websites inaccessible to their users. However, some DDoS attacks serve as a facade for other malicious acts. For example, when servers have been successfully knocked down, the culprits may go behind the scenes to dismantle the websites’ firewalls or weaken their security codes for future attack plans.

A DDoS attack can also function as a digital supply chain attack. If the cyber attackers cannot penetrate the security systems of their multiple target websites, they can find a weak link connected to all the targets and attack the link instead. When the link is compromised, the primary targets would automatically be indirectly affected as well.

Cyber vandals keep creating new ways to commit cybercrimes for fun or profit. It is imperative that every device that has access to the internet has security protocols in place to restrict access.

DDoS Attack Examples

One of the more recent examples of a DDoS Attack occurred in February 2020, impacting Amazon Web Services (AWS), a cloud computing service used by over a million companies, individuals, and government entities.

The hackers used directories on Connection-less Lightweight Directory Access Protocol (CLDAP) servers to send huge amounts of information to AWS's servers—as many as 2.3 terabits per second (Tbps). However, Amazon was able to stop the attack before it became a big security risk for its customers.

In October 2016, a DDoS attack was carried out on a domain name system (DNS) provider, Dyn, which hosts and manages the domain names of select companies in this directory on its server. When Dyn’s server was compromised, it also affected the websites of the companies it hosts. The attack on Dyn flooded its servers with overwhelming traffic, creating a massive web outage and shutting down over 80 websites, including major sites like Twitter, Amazon, Spotify, Airbnb, PayPal, and Netflix.

Some traffic was detected as coming from a botnet created with malicious software known as Mirai, which seemed to have affected more than 500,000 devices connected to the internet. Unlike other botnets that capture private computers, this botnet gained control over easily accessible Internet of Things (IoT) devices such as internet-connected cameras and recording devices. These weakly secured devices were then used to make a DDoS attack designed to take down the Sony Playstation Network's gaming platform by sending an insurmountable number of requests to Dyn’s server.

What Is a DoS Attack?

A DoS (denial-of-service) attack is a cyberattack that makes a computer or other device unavailable to its intended users. This is usually accomplished by overwhelming the targeted machine with requests until normal traffic can no longer be processed. With a DoS attack, a single computer launches the attack. This differs from a DDoS (distributed denial-of-service) attack, in which multiple systems simultaneously overwhelm a targeted system.

What Is a DDoS Attack?

A DDoS (distributed denial-of-service) attack happens when multiple systems overwhelm the bandwidth or resources of a targeted system. A DDoS attack uses various sources of attack traffic, often in the form of a botnet.

What Do Cyberattackers Target?

Cyberattackers are motivated by different goals. For example, they may seek:

  • Financial data (business and customer)
  • Sensitive personal data
  • Customer databases, including personally identifiable information (PII)
  • Email address and login credentials
  • Intellectual property, such as trade secrets and product designs
  • IT infrastructure access
  • U.S. government departments and agencies

The Bottom Line

Denial of service attacks are a method used by hackers to shut down internet service for a specific purpose. Extortion, theft, political statements, or just doing it for fun are reasons these attacks take place.

Because of denial of service and distributed denial of service attacks—and many other security issues—it's important to ensure you use the latest, updated hardware in your personal and professional life. Likewise, businesses should also have the latest technology to secure their data. If you can afford it as a business owner, it's best to hire the services of a cybersecurity firm to ensure you and your customers have the latest security.

Article Sources
Investopedia requires writers to use primary sources to support their work. These include white papers, government data, original reporting, and interviews with industry experts. We also reference original research from other reputable publishers where appropriate. You can learn more about the standards we follow in producing accurate, unbiased content in our editorial policy.
  1. Microsoft. "Top 5 Most Famous DDoS Attacks."

  2. Amazon Web Services. "AWS Shield Threat Landscape Report – Q1 2020," Page 3.

  3. The United States Department of Justice. "Individual Pleads Guilty to Participating in Internet-of-Things Cyberattack in 2016."

  4. IBM. "What is a cyber attack?"

Open a New Bank Account
×
The offers that appear in this table are from partnerships from which Investopedia receives compensation. This compensation may impact how and where listings appear. Investopedia does not include all offers available in the marketplace.
Sponsor
Name
Description