What 'Denial Of Service Attack (DoS)'

A Denial Of Service Attack (DoS) is an intentional cyberattack carried out on networks, websites and online resources to restrict access to its legitimate users. Denial of Service (DoS) attacks is highly notable events that may last from a few hours to many months. A type of DoS attack that is prevalent on the web is called the Distributed Denial of Service (DDoS) attack.

BREAKING DOWN 'Denial Of Service Attack (DoS)'

DoS attacks are on the rise because as businesses and consumers use more digital platforms in communicating and transacting with each other; these cyberattacks target digital intellectual property and infrastructures. Cyberattacks are typically launched to steal personally identifiable information (PII), causing considerable damages to the businesses’ financial pockets and reputation. Data breaches can target a specific company or a host of companies at the same time. A company with high-security protocols in place may be attacked through a member of its supply chain with inadequate security measures. When multiple companies have been selected for an attack, the perpetrators can use a Denial of Service Attack (DoS) approach.

In a DoS attack, the cyberattackers typically use one internet connection and one device to send rapid and continuous requests to a target server to overload the server’s bandwidth. DoS attackers exploit a software vulnerability in the system and proceed to exhaust the RAM or CPU of the server. The damage in loss of service done by a DoS attack can be fixed in a short time by implementing a firewall with allowing and deny rules. Since a DoS attack only has one IP address, the IP address can be easily fished out and denied further access using a firewall. However, there is a type of DoS attack that is not so easy to detect – Distributed Denial of Service (DDoS) attack.

Distributed Denial of Service Attack

A Distributed Denial of Service (DDoS) attack uses multiple infected devices and connections spread around the world as a botnet. A botnet is a network of personal devices which have been compromised by cybercriminals without the knowledge of the owners of the devices. The hackers infect the computers with malicious software to gain control of the system to send spam and fake requests to other devices and servers. A target server that falls victim to a DDoS attack will experience an overload due to the hundreds or thousands of phony traffic that comes in. Because the server is attacked from multiple sources, detecting all the addresses from these sources may prove difficult. Also separating legitimate traffic from the fake traffic may also be impossible to do, hence, another reason why it is hard for a server to withstand a DDoS attack.

Unlike most cyberattacks that are initiated to steal sensitive information, initial DDoS attacks are launched to make websites inaccessible to their users. However, some DDoS attacks are used as a façade for other malicious acts. When servers have been successfully knocked down, the culprits may go behind the scenes to dismantle the websites’ firewalls or weaken their security codes for future attack plans.

A DDoS attack can also be used as a digital supply chain attack. If the cyberattackers cannot penetrate the security systems of their multiple target websites, they can find a weak link that is connected to all the targets and attack the link instead. When the link is compromised, the primary targets would automatically be indirectly affected as well.

Distributed Denial of Service Attack Example

In October 2016, a DDoS attack was carried out on a domain name service (DNS) provider, Dyn. Think of a DNS as the internet’s directory that routes your request or traffic to the intended webpage. A company like Dyn hosts and manages the domain name of select companies in this directory on its server. When Dyn’s server is compromised, this also affects the websites of the companies that it hosts. The 2016 attack on Dyn, flooded its servers with an overwhelming amount of internet traffic, thereby creating a massive web outage and shutting down over 80 websites including major sites like Twitter, Amazon, Spotify, Airbnb, PayPal, and Netflix.

Some of the traffic was detected from a botnet created with malicious software known as Mirai that seemed to have affected over 500, 000 devices connected to the internet. Unlike other botnets that capture private computers, this particular botnet gained control over the easily accessible Internet of Things (IoT) devices such as DVRs, printers, and cameras. These weakly secured devices were then used to make a DDoS attack by sending an insurmountable number of requests to Dyn’s server.

Cyber vandals keep coming up with new ways to commit cybercrime either for fun or profit. It is imperative that every device that has access to the internet have security protocols in place to restrict access.

  1. Botnet

    A botnet is a network of internet-connected devices that have ...
  2. Cybersecurity

    Cybersecurity refers to the measures taken to keep electronic ...
  3. 51% Attack

    51% attack refers to an attack on a blockchain – usually bitcoin's, ...
  4. Zero Day Attack

    Zero Day Attack is an attack that exploits a potentially serious ...
  5. Ransomware

    Ransomware is a cyber-extortion tactic that uses malicious software ...
  6. Hacktivism

    Hacktivism is a social or political activist plan that is carried ...
Related Articles
  1. Investing

    Are Hackers to Blame for Brokerage Outages? ThousandEyes Thinks So

    Online brokerages suffered intermittent outages during heightened trading this week, but ThousandEyes thinks a DDoS attack may have been at play.
  2. Investing

    Terrorism's Effects on Wall Street

    Terrorist activity tends to have a negative impact on the markets, but just how much? Find out how to take cover.
  3. Insights

    Top Cyber Security Risks for Financial Advisors

    Cyber crime is on the rise. Here's what advisory firms, big and small, need to be aware of and how to prepare.
  4. Investing

    Android Phones Vulnerable to Wi-Fi Attacks: Report

    Cybersecurity experts say a new kind of attack lets hackers read Wi-Fi traffic, inject malware.
  5. Investing

    Microsoft Turns to AI to Fight Cyberattacks

    Microsoft is turning to artificial intelligence in the wake of the WannaCry ransomware attacks.
  6. Tech

    The Internet Of Things In 2015

    By now, the internet has made its way into nearly all of our homes and via mobile devices into our pockets. Technology think-tank ABI estimates that there will be over 30 billion devices connected ...
  7. Tech

    What is Botnet Mining?

    Beyond the standard mining process, botnet mining is another profitable, yet illicit, way to earn cryptocurrencies
  8. Tech

    Bitcoin Price Drops After "WannaCry" Ransomware Taint

    Bitcoin price has undergone a price revision since the WannaCry cyber-attack.
  9. Tech

    Protect Your Small Business from Cybercrime

    Small business owners are a growing target for cyber-attacks; protect yourself and your clients.
  10. Investing

    Report: Microsoft Charged for 'WannaCry' Patch

    Microsoft opted to charge users for a patch that would have slowed the global ransomware attack.
  1. What impact have terrorist attacks had on the insurance industry?

    Learn about the impact of terrorist attacks on the insurance industry and how the 9/11 terrorist attack led to important ... Read Answer >>
  2. What are the risks associated with investing in the banking sector?

    Find out about the risks associated with investing in the banking sector including liquidity, risk management, consumer protection ... Read Answer >>
  3. Who are GoDaddy's (GDDY) main competitors?

    GoDaddy, the biggest domain registrar has enjoyed great success over the years but its market dominance is now under threat ... Read Answer >>
  4. What are examples of popular companies in the Internet sector?

    Discover which Internet companies are the most popular among investors in this high potential growth area of the technology ... Read Answer >>
Hot Definitions
  1. Return on Assets - ROA

    Return on assets (ROA) is an indicator of how profitable a company is relative to its total assets.
  2. Fibonacci Retracement

    A term used in technical analysis that refers to areas of support (price stops going lower) or resistance (price stops going ...
  3. Ethereum

    Ethereum is a decentralized software platform that enables SmartContracts and Distributed Applications (ĐApps) to be built ...
  4. Cryptocurrency

    A digital or virtual currency that uses cryptography for security. A cryptocurrency is difficult to counterfeit because of ...
  5. Financial Industry Regulatory Authority - FINRA

    A regulatory body created after the merger of the National Association of Securities Dealers and the New York Stock Exchange's ...
  6. Initial Public Offering - IPO

    The first sale of stock by a private company to the public. IPOs are often issued by companies seeking the capital to expand ...
Trading Center