Denial-of-service attack or DoS attack is a process wherein a computer resource becomes inaccessible to the users to which it is originally created for. This is also sometimes referred to as the distributed denial-of-service attack or a DDoS attack. This name is mostly used in the field that involves computer networks. However, contrary to popular belief, this form of attack is also performed on the area of CPU resource management.
Based on reports on IT security, there are various processes involving DoS as well as purposes and targets of the attacks. In addition, the denial-of-service attack may only be carried out if the effort of an individual or a group is very much intensive. They should work very hard so as to obtain their goal, which is to hinder websites and services from working successfully for some moments or for an indefinite period time.
The usual target websites or services of the individuals who initiate DoS attacks are those that are supported by prestigious web servers including the banks, root nameservers, and credit card payment entries.
Genuine Traffic Flood
There is an assortment of procedures as to how denial-of-service attacks are initiated by the criminals. One of which is the saturation of the machine of the target using an external communications requests. In this way, the machine is prevented from reacting to a genuine traffic. Otherwise, the computer will respond at a snail’s pace, which makes it appear to be inaccessible.
Denial-of-service attacks are executed through two general techniques and one is by making the target reset itself. Another method is by using up all the machine’s resources because in this way, the computer can no longer offer its service. This is also the technique that can impede the channels of communication among the users and the targets. Thus, this can cut off the communication between the two parties.