Denial Of Service Attack

Reading time: 14 minutes


Denial Of Service Attack is a form of cyber attack basically used by hackers to prevent the victims from accessing any legitimate service. This hacker floods the web servers with excessive traffic in order to succeed in this attack. The attack does not result in theft or loss of data but can cause victim a great deal of time and money to handle this type of attack.

Procedure For The Attack

Attack Procedure is as follows:

  1. A hacker first searches for the target on which he wants to attack. For example, is a website where he wants to attack.

  2. After finding the target, the hacker first spreads the malware to various systems through spam emails or various methods of social engineering and compromise those systems to behave as bots.

  3. After compromising the system, now the hacker targets the victim and for this he will use all the compromised systems traffic to redirect to the victim website, for example, if cannot handle more than 1000 requests in a minute, so a hacker, therefore, sent excessive messages to flood the website with extra traffic that the victim web servers cannot handle in a minute.

  4. If the website is not opening or is showing an error on the webpage that means the attack is successful. i.e. is inaccessible and anyone cannot access the website for a while until the systems are restored and get back to the operational mode.

Mitigation For The Attack

Restrict the number of requests a server can accept over a specified time window is a way of preventing the denial-of-service attacks. The WAF(Web Application Firewall) can also help to avoid this kind of attack. Organizations should have a modern and up-to-date security infrastructure for handling this type of attack. Update the anti-malware software and firewalls time to time.

Image For Understanding The Attack


MCQ Round

Question 1

What does DoS stands For?

Denial Of Start
Denial Of Service
Distribution Of Service
Distribution Of Start

Question 2

What is the effect of DoS attack

All the data is stolen.
Website became inaccessible
The website can be controlled remotely
The website database is deleted