Denial-of-service attack

DDoSdenial of servicedistributed denial of servicedenial-of-serviceDDoS attackdistributed denial-of-servicedenial of service attackdistributed denial-of-service attackdenial of service attacksDoS
In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.wikipedia
968 Related Articles

Smurf attack

Fraggle attacksmurffraggle
Some common examples of DDoS attacks are fraggle, smurf, and SYN flooding.
The Smurf attack is a distributed denial-of-service attack in which large numbers of Internet Control Message Protocol (ICMP) packets with the intended victim's spoofed source IP are broadcast to a computer network using an IP broadcast address.

Arbor Networks

Arbor
On March 5, 2018, an unnamed customer of the US-based service provider Arbor Networks fell victim to the largest DDoS in history, reaching a peak of about 1.7 terabits per second.
The company's products are used to protect networks from denial-of-service attacks, botnets, computer worms, and efforts to disable network routers.

DDoS mitigation

DDoS protectionmitigationAnti-DDoS
An advanced persistent DoS (APDoS) is associated with an advanced persistent threat and requires specialised DDoS mitigation.
DDoS mitigation is a set of techniques or tools for resisting or mitigating the impact of distributed denial-of-service (DDoS) attacks on networks attached to the Internet by protecting the target and relay networks.

Botnet

botnetsCommand and control (malware)command and control
Usually powered by a botnet, the traffic produced by a consumer stresser can range anywhere from 5-50 Gbit/s, which can, in most cases, deny the average home user internet access.
Botnets can be used to perform distributed denial-of-service attack (DDoS attack), steal data, send spam, and allows the attacker to access the device and its connection.

Anonymous (group)

AnonymousAnonymous PhilippinesAnonymous hacktivist group
In other cases a machine may become part of a DDoS attack with the owner's consent, for example, in Operation Payback, organized by the group Anonymous.
Anonymous is a decentralized international hacktivist group that is widely known for its various DDoS cyber attacks against several governments, government institutions and government agencies, corporations, and the Church of Scientology.

Ingress filtering

filter users by IP addressBCP 38ingress
Since the incoming traffic flooding the victim originates from different sources, it may be impossible to stop the attack simply by using ingress filtering.
This technique is often used in the denial-of-service attack, and this is a primary target of ingress filtering.

Operation Payback

Operation Avenge AssangeOperation: Paybacktemporarily disrupting the website of MasterCard
In other cases a machine may become part of a DDoS attack with the owner's consent, for example, in Operation Payback, organized by the group Anonymous.
Operation Payback started as retaliation to distributed denial of service (DDoS) attacks on torrent sites; piracy proponents then decided to launch DDoS attacks on piracy opponents.

Low Orbit Ion Cannon

LOIC
The LOIC has typically been used in this way.
Low Orbit Ion Cannon (LOIC) is an open-source network stress testing and denial-of-service attack application, written in C#.

High Orbit Ion Cannon

HOIC
Along with HOIC a wide variety of DDoS tools are available today, including paid and free versions, with different features available.
High Orbit Ion Cannon (HOIC) is an open-source network stress testing and denial-of-service attack application designed to attack as many as 256 URLs at the same time.

LAND

LAND attackLocal Area Network Denial
A LAND attack is of this type.
A LAND (local area network denial) attack is a DoS (denial of service) attack that consists of sending a special poison spoofed packet to a computer, causing it to lock up.

Cyberattack

cyber attackcyber-attackcyberattacks
In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

Mydoom

DoomjuiceMydoom wormMydoom.B
In cases such as MyDoom and Slowloris the tools are embedded in malware, and launch their attacks without the knowledge of the system owner.
Speculative early coverage held that the sole purpose of the worm was to perpetrate a distributed denial-of-service attack against SCO Group.

XML denial-of-service attack

XDoS
A kind of application-level DoS attack is XDoS (or XML DoS) which can be controlled by modern web application firewalls (WAFs).
An XML denial-of-service attack (XDoS attack) is a content-borne denial-of-service attack whose purpose is to shut down a web service or system running that service.

Fork bomb

Bacteria (malware)ForkbombRabbit program
An attacker with shell-level access to a victim's computer may slow it until it is unusable or crash it by using a fork bomb.
In computing, a fork bomb (also called rabbit virus or wabbit ) is a denial-of-service attack wherein a process continually replicates itself to deplete available system resources, slowing down or crashing the system due to resource starvation.

Malware

malicious softwaremalicious codemalicious
In cases such as MyDoom and Slowloris the tools are embedded in malware, and launch their attacks without the knowledge of the system owner.
Infected "zombie computers" can be used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion.

Zombie (computing)

Zombie (computer science)zombie computerzombies
It uses a layered structure where the attacker uses a client program to connect to handlers, which are compromised systems that issue commands to the zombie agents, which in turn facilitate the DDoS attack.
Botnets of zombie computers are often used to spread e-mail spam and launch denial-of-service attacks (DoS attacks).

Web server

web serverswebserverHTTP server
Criminal perpetrators of DoS attacks often target sites or services hosted on high-profile web servers such as banks or credit card payment gateways.

SYN flood

malicious intentSYN attackSYN flooding
Some common examples of DDoS attacks are fraggle, smurf, and SYN flooding.
A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic.

Exploit (computer security)

exploitexploitssecurity exploit
Various DoS-causing exploits such as buffer overflow can cause server-running software to get confused and fill the disk space or consume all available memory or CPU time.
Such behavior frequently includes things like gaining control of a computer system, allowing privilege escalation, or a denial-of-service (DoS or related DDoS) attack.

Cloudflare

CloudFlare protectionCloudFlare’s
In November 2017; Junade Ali, a Computer Scientist at Cloudflare noted that whilst network-level attacks continue to be of high capacity, they are occurring less frequently.
Cloudflare claims this can mitigate advanced Layer 7 attacks by presenting a JavaScript computational challenge which must be completed by a user's browser before the user can access a website.

Stacheldraht

Stacheldraht is a classic example of a DDoS tool.
Stacheldraht (German for "barbed wire") is malware written by Mixter for Linux and Solaris systems which acts as a distributed denial-of-service (DDoS) agent.

Ping flood

ICMP flooding
Ping flood is based on sending the victim an overwhelming number of ping packets, usually using the "ping" command from Unix-like hosts (the -t flag on Windows systems is much less capable of overwhelming a target, also the -l (size) flag does not allow sent packet size greater than 65500 in Windows).
A ping flood is a simple denial-of-service attack where the attacker overwhelms the victim with ICMP "echo request" (ping) packets.

IP address spoofing

IP spoofingspoofedspoofing
As an alternative or augmentation of a DDoS, attacks may involve forging of IP sender addresses (IP address spoofing) further complicating identifying and defeating the attack.
IP address spoofing is most frequently used in denial-of-service attacks, where the objective is to flood the target with an overwhelming volume of traffic, and the attacker does not care about receiving responses to the attack packets.

BlackNurse

The BlackNurse attack is an example of an attack taking advantage of the required Destination Port Unreachable ICMP packets.
The BlackNurse attack is a form of denial of service attack based on ICMP flooding.

WinNuke

tends to be poorly implemented
A specific example of a nuke attack that gained some prominence is the WinNuke, which exploited the vulnerability in the NetBIOS handler in Windows 95.
In computer security, WinNuke is an example of a Nuke remote denial-of-service attack (DoS) that affected the Microsoft Windows 95, Microsoft Windows NT and Microsoft Windows 3.1x computer operating systems.