We are still actively working on the spam issue.
Difference between revisions of "DDOS"
(added cleared definition, categories, external links) |
m (Hacking is playful cleverness.) |
||
(3 intermediate revisions by 2 users not shown) | |||
Line 3: | Line 3: | ||
A DDOS is a form of computer attack in which a victim is overwhelmed with network requests from multiple attackers (often from a [[Botnet (Computer Network) | botnet]]), causing the victim to be unable to serve appropriate responses to legitimate network traffic (e.g. a website being unable to send you it's homepage). DDOS's are considered a rather unsophisticated attack, rather their simplicity is what makes them effective. | A DDOS is a form of computer attack in which a victim is overwhelmed with network requests from multiple attackers (often from a [[Botnet (Computer Network) | botnet]]), causing the victim to be unable to serve appropriate responses to legitimate network traffic (e.g. a website being unable to send you it's homepage). DDOS's are considered a rather unsophisticated attack, rather their simplicity is what makes them effective. | ||
− | =Types of Denial of Service Attacks= | + | ==Types of Denial of Service Attacks== |
Denial of Service covers a number of attack types. TCP SYN floods, ICMP floods, and DNS overloads are all examples of DDOS attacks. | Denial of Service covers a number of attack types. TCP SYN floods, ICMP floods, and DNS overloads are all examples of DDOS attacks. | ||
− | =Use of a Denial of Service Attack= | + | ==Use of a Denial of Service Attack== |
A Denial of Service attack is primarily used to prevent use of a service, typically shutting down a webpage. This can be used in other ways, such as blinding network monitoring software to a real attack. | A Denial of Service attack is primarily used to prevent use of a service, typically shutting down a webpage. This can be used in other ways, such as blinding network monitoring software to a real attack. | ||
Denial of Service attacks are also less commonly used to provide the necessary traffic load for failover attacks | Denial of Service attacks are also less commonly used to provide the necessary traffic load for failover attacks | ||
− | =See Also= | + | ==See Also== |
− | * [ | + | * [[Wikipedia:Lizard_Squad |Lizard Squad]] DDoS'd PS4 and XBoX Live gaming networks at christmas for all the pimpled teens wanting to play the latest Cawla Doody. |
− | * Some | + | * Some cracker groups have offered [http://www.tripwire.com/state-of-security/security-data-protection/cyber-security/dd4bc-group-targets-companies-with-ransom-driven-ddos-attacks/ DDoS for BitCoin]. |
[[Category:Terms]] | [[Category:Terms]] | ||
− | [[Category: | + | [[Category:Networking]] |
[[Category:Security]] | [[Category:Security]] |
Latest revision as of 03:55, 10 May 2022
DDOS stands for Distributed Denial Of Service.
A DDOS is a form of computer attack in which a victim is overwhelmed with network requests from multiple attackers (often from a botnet), causing the victim to be unable to serve appropriate responses to legitimate network traffic (e.g. a website being unable to send you it's homepage). DDOS's are considered a rather unsophisticated attack, rather their simplicity is what makes them effective.
Types of Denial of Service Attacks
Denial of Service covers a number of attack types. TCP SYN floods, ICMP floods, and DNS overloads are all examples of DDOS attacks.
Use of a Denial of Service Attack
A Denial of Service attack is primarily used to prevent use of a service, typically shutting down a webpage. This can be used in other ways, such as blinding network monitoring software to a real attack. Denial of Service attacks are also less commonly used to provide the necessary traffic load for failover attacks
See Also
- Lizard Squad DDoS'd PS4 and XBoX Live gaming networks at christmas for all the pimpled teens wanting to play the latest Cawla Doody.
- Some cracker groups have offered DDoS for BitCoin.