DoS/ DDoS Attack Explained with example.

Hey, a visitor today I am going to explain to you about DoS attack. DoS (Denial-of-service) attack is the full form of DoS. If you’re serious to know about DoS/DDoS attack. Then stay here and watch the full content about DoS.

DoS(Denial of service)

DoS attack is a cyber-attack where the perpetrators seek to make a machine or network resources unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the internet. It is an attack used to deny legitimate users access to a resource such as accessing a website, network, emails, etc. or making it extremely slow. This type of attack is usually implemented by hitting the target resource such as a web server with too many requests at the same time. This result in the server failing to respond to all the requests. The effect of this can either be crashing the servers or slowing them down.

Denial of service(DoS) is basically a simple attack that is designed to bring the network to its knees by flooding it with useless traffic. In its simplest form, It uses up all of the system resources so that others can’t connect. More sophisticated attacks will cause the system to crash or create an infinite loop that uses all of the system’s CPU cycles.

DoS attack

Why DoS Attack?

Criminal perpetrators of DoS attacks often target sites or services hosted on high-profile web servers such as banks or credit card payment gateways Revenge, Blackmail and activism can motivate these attacks. DDoS also follow DoS mechanism. Cutting off some business from the internet can lead to significant loss of business or money. The internet and computer networks power a lot of businesses. Some organizations such as payment gateways, e-commerce sites entirely depend on the internet to do business.

Another example of a DoS attack

Wifi Jammer

Buffer overflow

DoS Attack is distributed in a different category

1. Volumetric Attack

The attacker simply sends a large volume of packets to the target thereby using up all the resources. The resources used might simply be bandwidth

2. Fragmentation Attack

IP fragmentation is the process of breaking up a single internet protocol (IP) datagram into multiple packets of smaller size. Every network link has a characteristic size of the message that may be transmitted, called the maximum transmission unit(MTU). Part of the TCP/IP suite is the internet protocol (IP) which resides at the internet layer of this model. IP is responsible for the transmission of packets between network and points. IP includes some features which provide a basic measure of fault-tolerance(time to live checksum),……

3. Application Layer Attack

An application layer DDoS attack (Sometimes referred to as layer 7 DDoS attack) is a form of DDoS attack where attacker targets the application layer of the OSI model. The attack over-exercises specific functions or features of the websites with the intention to disable those function and features. This application-layer attack is different from an entire network attack and is often used against financial institution to distract IT and Security personnel from security breaches.

DDoS(Distributed Denial of Service)

Distributed Denial of Service attack (DDoS attack), the incoming traffic flooding the victim originates from many different sources. This effectively makes it impossible to stop the attack simply by blocking a single source.

  A  Distributed Denial of Service attack (DDoS attack) occurs when multiple system flood the bandwidth or resources of a targeted system, usually one or more web servers. Such an attack is often the result of multiple compromised systems (for example, a botnet) flooding the targeted system with traffic.