| Most of this page uses content from Wikipedia. The original article was at Denial-of-service attack.|
The list of authors can be seen in the page history. As with Computer Security Wiki, the text of Wikipedia is available under the GNU Free Documentation License.
Remove this template when most of the Wikipedia content has been removed or the Wikipedia information is outnumbered by non-Wikipedia information.
One common method of attack involves saturating the target (victim) machine with external communications requests, such that it cannot respond to legitimate traffic, or responds so slowly as to be rendered effectively unavailable. In general terms, DoS attacks are implemented by either forcing the targeted computer(s) to reset, or consuming its resources so that it can no longer provide its intended service or obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately.
Denial-of-service attacks are considered violations of the IAB's Internet Proper Use Policy. They also commonly constitute violations of the laws of individual nations.
- ↑ Phillip Boyle (2000). "SANS Institute - Intrusion Detection FAQ: Distributed Denial of Service Attack Tools: n/a". SANS Institute. Retrieved on May 2 2008.
- RFC 4732 Internet Denial-of-Service Considerations
- W3C The World Wide Web Security FAQ
- cert.org CERT's Guide to DoS attacks.
- ATLAS Summary Report - Real-time global report of DDoS attacks.
- linuxsecurity.com An article on preventing DDoS attacks.
- Is Your PC a Zombie?, About.com.
- How to Protect from DDoS - Cloudwards.net