Denial of Service (DOS) Attack [UseThisTip Explains]

DOS attack or Denial of service attack is one of most popular attack used by cyber criminals against websites. Sometimes people confused with MS-DOS and think why this is being called an attack. If you are also one of those, stop connecting DOS attack with MS DOS. Both are different. In DOS attack, DOS stands or Denial of Service.
In DOS attack, the attacker tries to flood the server by sending fake traffic. So, the server will not be available to fulfill legitimate visitor’s request. This is the reason why it is called Denial of service. It also has an advanced version called Distributed Denial of Service of (DDOS) attack.
Denial of Service or DOS attack
How Denial of Service Attack Works?
by the server.
Distributed Denial Of Service Attack
Most of the time attacker uses some malware and bot programs to perform the DDOS attack. In this malware targets innocent system and starts performing DOS attack from there. The owner of the system never knew that he has become the part of the DDOS attack.
- Volume Based Attacks: It includes UDP floods, ICMP floods, and other spoofed-packet floods.
- Protocol Attacks: It includes SYN floods, fragmented packet attacks, Ping of Death, Smurf DDoS and more.
- Application Layer Attacks: It includes Zero-day DDoS attacks that target Apache, Windows or OpenBSD vulnerabilities.
How to Block DOS attack
DOS attack can be blocked by using a proper filter. Web servers can set a pattern and look for each coming request. If it gets multiple fake requests from a source, block its IP address.
Leave a comment
Comment policy: We love comments and appreciate the time that readers spend to share ideas and give feedback. However, all comments are manually moderated and those deemed to be spam or solely promotional will be deleted.