September 3, 2021
logo
What Is The Purpose Of A Denial-Of-Service Attack?

What Is The Purpose Of A Denial-Of-Service Attack?

James HawesSeptember 3, 2021,

A denial-of-service (DoS) or distributed denial-of-service (DDoS) attack attempts to make a machine or network resource unavailable to its intended users. The means to carry out a DoS attack may vary. Still, the purpose is usually to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely.

A DoS attack can be perpetrated by disrupting services on one host to affect other hosts with which those services communicate. Cyber vandalism is typically executed through malware such as viruses and worms that infect many computers across various networks worldwide. 

These infected machines are known as zombies, used by attackers to send spam e-mails and launch DDOS attacks. In the 2000s, large numbers of computers were taken over via trojans hidden in web pages; this method required no hacking skills from the perpetrators.

There are various purposes of DOS and DDOS attacks, some of which are listed below.

Crashing A Server

A DOS attack floods the target with traffic to overload its capacity and causes it to shut down or reboot. This can be done by sending large amounts of data over TCP/IP connections on port 80 (HTTP) or 21 (FTP). This type of attack aims not necessarily to gain access but rather to disrupt service for legitimate users.

For Creating Bots

The most common reason for DOS attacks is to lead a Distributed Denial Of Service Attacks. In DDOS attacks, thousands of compromised devices can be used as bots to send requests at once to a server or many servers. These requests will cause the servers to crash under their weight if they don't have enough bandwidth available.

Making Resource Unavailable

The most common purpose of the denial of service or distributed denial of service attack is to make computer resources unavailable to their intended users. The goal of such attacks can be damaging an organization’s reputation, protest, preventing access, moral/political demands, protest against corporate abuse, or pinpointing poor security of a company. 

Hackers often use automated tools called botnets for carrying out DDoS attacks against their targets without having any special knowledge about them beforehand. 

To learn more about cyber security and cyber attacks, visit us at www.neguard.com.

OUR BLOG
Do Spouses Of Deceased Veterans Get Benefits?
Do Spouses Of Deceased Veterans Get Benefits?
Survivors of deceased military personnel and veterans are eligible for various benefits. Dependent Indemnity Compensation, a Death Gratuity payment, and ...
What Is Combat-Related Special Compensation?
What Is Combat-Related Special Compensation?
Combat-Related Special Compensation (CRSC) pays special compensation to retirees whose income has been reduced due to receiving disability compensation from ...
What is A Court Martial?
What is A Court Martial?
,
A court-martial is a military court hearing analogous to a civilian court trial. It is typically used to punish significant ...
A Time-Honored Tradition Of Burial At Sea
Most people believe that a burial at sea only happens in movies, yet it is a viable option still used ...
What Are Enlisted Air Force Ranks?
What Are Enlisted Air Force Ranks?
,
Airmen (E-1 through E-4), non-commissioned officers (E-5 and E-6), and senior non-commissioned officers (E-7 and E-8) are the three tiers ...
Questions To Ask When Hiring A Security Guard For Your Top Executives
Questions To Ask When Hiring A Security Guard For Your Top Executives
, ,
Employing Security guards for top executives is not an easy task. Sure, some agencies may hand you the best guards ...
1 2 3 17
logo
NE Guard is your go-to choice when it comes to the latest news regarding security. Our team has got you covered whether you're looking for physical or virtual safety.
Copyright © 2022 NE Guard. All Rights Reserved.
DMCA.com Protection Status
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram