{"id":2363,"date":"2024-02-13T10:29:24","date_gmt":"2024-02-13T10:29:24","guid":{"rendered":"https:\/\/crea.space\/?post_type=dictionary&p=2363"},"modified":"2024-07-05T17:24:41","modified_gmt":"2024-07-05T17:24:41","slug":"dos","status":"publish","type":"dictionary","link":"https:\/\/crea.space\/web-development-dictionary\/dos","title":{"rendered":"DoS"},"content":{"rendered":"\n
A denial-of-service (DoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. Distributed denial-of-service (DDoS) attacks amplify this disruption by using multiple compromised computer systems as sources of attack traffic.<\/p>\n\n\n\n
The term \"denial-of-service\" comes from the basic function of the attack: to deny legitimate users access to a service. The prefix \"distributed\" in DDoS refers to the distributed nature of the attack sources.<\/p>\n\n\n\n
Botnets are a prevalent tool in DDoS attacks, where networks of compromised computers (known as bots) are controlled remotely by the attacker to launch coordinated assaults. Another technique is amplification attacks, which exploit publicly accessible UDP servers to flood a target system with amplified responses, thereby overwhelming it with a massive amount of traffic. Reflection attacks are also commonly used, where the attacker sends forged requests to numerous devices, which then reply to the target system, effectively redirecting the flood of responses to the victim. These methods leverage the distributed nature of modern internet infrastructure to multiply the impact of the attack, making it more difficult to mitigate and manage.<\/p>\n\n\n\n
The GitHub attack in 2018 was the largest recorded DDoS attack at the time, reaching a peak of 1.35 Tbps. This attack utilized a memcached reflection technique, which involves sending a small query to a vulnerable server that then responds with a much larger amount of data directed at the target. This overwhelming influx of data significantly disrupted GitHub's services, but robust defense mechanisms quickly mitigated the impact.<\/p>\n\n\n\n
The Dyn attack in 2016 had widespread effects, causing major internet platforms and services to be unavailable across Europe and North America. This attack leveraged a large botnet, composed primarily of Internet of Things (IoT)<\/a> devices infected with the Mirai<\/a> malware. By flooding Dyn, a major DNS provider, with traffic, the attack disrupted the resolution of domain names, making it impossible for users to access many popular websites and online services during the attack period.<\/p>\n\n\n\n A DoS attack disrupts a website, server, or network by flooding it with fake traffic, making it unavailable to real users.<\/p>\n","protected":false},"featured_media":4120,"template":"","class_list":["post-2363","dictionary","type-dictionary","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"\nLegal and ethical considerations<\/h2>\n\n\n\n
\n
\n