What Is a Denial of Service (DoS) Attack? - CrowdStrike (2024)

Cybersecurity 101Denial-of-Service (DoS) Attacks

Bart Lenaerts-Bergmans - April 11, 2023

What Is a Denial-of-Service (DoS) Attack?

A Denial-of-Service (DoS) attack is a cyberattack that floods a machine or network with false requests in order to disrupt business operations. In a DoS attack, users are unable to perform routine and necessary tasks, such as accessing email, websites, online accounts or other resources that are operated by a compromised computer or network.

While most DoS attacks do not result in lost data and are typically resolved without paying a ransom, they cost the organization time, money and other resources in order to restore critical business operations.

How Do DoS Attacks Work?

A DoS attack is most commonly accomplished by flooding the targeted host or network with illegitimate service requests. The hallmark of these attacks is the use of a false IP address, which prevents the server from authenticating the user. As the flood of bogus requests are processed, the server is overwhelmed, which causes it to slow and, at times, crash—at which point, access by legitimate users is disrupted. In order for most DoS attacks to be successful, the malicious actor must have more available bandwidth than the target.

Types of DoS Attacks

There are two main types of DoS attacks:

  1. Those that crash web-based services, called buffer overflows.
  2. Those that flood them, called flood attacks.

Within those two categories, there are different subsets, which vary based on the adversary’s methods, the equipment that is targeted and how the attack is measured.

TypeDescriptionExamples
1. Buffer OverflowsBuffer overflows is the most common form of DoS attack. In this type of exploit, the adversary drives more traffic to a network address than the system is capable of handling. This causes the machine to consume all available buffers, or memory storage regions that temporarily hold data while it is being transferred within the network. A buffer overflow occurs when the volume of data exceeds all available bandwidth, including disk space, memory, or CPU, resulting in slow performance and system crashes.Stack Overflow: Most common type of buffer overflow attack where a computer program tries using memory space in the call stack that has been allocated to. It overrides the boundaries in which the buffer has been on.
Unicode Overflow: It creates a buffer overflow through Unicode, where any character can be created. The attack comes into play when Unicode is inserted on an expected ASCII input. Unicode and ASCII are encoding standards. They allow computers to represent text.
2. Flood AttacksFlood attacks occur when the system receives too much traffic for the server to manage, causing them to slow and possibly stop.ICMP Floods: Commonly called smurf or ping attacks, exploit misconfigured network devices. In these attacks, the adversaries deploy spoofed packets — or the false IP addresses — that “ping” each device on the targeted network without waiting for a reply. As the network manages the surge in traffic, the system will slow and possibly stop.
SYN Flood: It sends a connection request to a server, but never completes the metaphorical “handshake” with the host. These requests continue to flood the system until all open ports are saturated, leaving no available avenues for access for legitimate users.

What Is a Denial of Service (DoS) Attack? - CrowdStrike (1)

2024 CrowdStrike Global Threat Report

The 2024 Global Threat Report unveils an alarming rise in covert activity and a cyber threat landscape dominated by stealth. Data theft, cloud breaches, and malware-free attacks are on the rise. Read about how adversaries continue to adapt despite advancements in detection technology.

Download Now

How Can You Identify a DoS Attack?

The signs of a DoS attack can be observed by any network user. Common indicators include:

  • Slow network performance for common tasks, such as downloading/uploading files, logging into an account, accessing a website or streaming audio or video content.
  • Inability to access online resources, including websites or web-based accounts, such as bank accounts, investment portfolios, education materials or health records.
  • An interruption or loss in connectivity of multiple devices on the same network.

Unfortunately, for most system users, the symptoms of a DoS attack often resemble basic network connectivity issues, routine maintenance or a simple surge in web traffic — prompting many to disregard the issue.

DoS vs DDoS

The main difference between a Distributed Denial-of-Service (DDoS) attack and a DoS attack is the origin of the attack. DDoS is an orchestrated attack launched from multiple locations by several systems simultaneously, whereas a DoS attack is singular in nature.

Typically, a DDoS attack is considered to be more sophisticated and poses a much larger threat to organizations because it leverages multiple devices across a variety of geographies, making it more difficult to identify, track and neutralize. Most commonly, DDoS attackers leverage a botnet — a network of compromised computers or devices that are supervised by a channel — to carry out this type of synchronized attack.

How can you reduce the risk of a DoS attack

Robin Jackson, principal consultant for CrowdStrike, offered organizations the following tips to prevent, detect and remediate cyberattacks, including DoS attacks. Some of the tips he mentions in the blog post include:

  • Establish consistent and comprehensive training for employees about how to recognize common attack indicators and promote responsible online activity.
  • Verify extortion attempts when adversaries threaten massive DoS attacks. A cybersecurity partner could help the organization quickly investigate the threat and gauge their ability to disrupt operations — potentially saving the organization significant money in the event the threat is not credible.
  • Conduct routine tabletop exercises and penetration testing to improve prevention capabilities by identifying weaknesses in the network architecture.
  • Segregate backups to prevent enumeration if and when ransomware begins to encrypt.
  • Encrypt sensitive data when it is at rest and in motion to reduce the risk of data loss, leakage or theft.
  • Ensure the best instrumentation in order to improve network visibility.
  • Create a communications plan so that your company can manage media inquiries, customer questions and other stakeholders issues quickly and clearly.
  • Contact law enforcement so that officials have more information about cyber criminals and their tactics.

Learn More

Learn how the CrowdStrike Falcon® Platform helped identify a DoS attack affecting a number of websites. Read: Compromised Docker Honeypots Used for DoS Attack

What Is a Denial of Service (DoS) Attack? - CrowdStrike (2)

GET TO KNOW THE AUTHOR

Bart is Senior Product Marketing Manager of Threat Intelligence at CrowdStrike and holds +20 years of experience in threat monitoring, detection and intelligence. After starting his career as a network security operations analyst at a Belgian financial organization, Bart moved to the US East Coast to join multiple cybersecurity companies including 3Com/Tippingpoint, RSA Security, Symantec, McAfee, Venafi and FireEye-Mandiant, holding both product management, as well as product marketing roles.

Featured Articles

What is Internet of Things (IoT) Security?
How to create an employee cybersecurity awareness training program (with examples)
10 Most Common Types of Cyber Attacks
What Is a Denial of Service (DoS) Attack? - CrowdStrike (2024)

FAQs

What Is a Denial of Service (DoS) Attack? - CrowdStrike? ›

A Denial-of-Service (DoS) attack is a cyberattack that floods a machine or network with false requests in order to disrupt business operations.

What is a denial of service DoS attack? ›

A denial-of-service (DoS) attack is a type of cyber attack in which a malicious actor aims to render a computer or other device unavailable to its intended users by interrupting the device's normal functioning.

Which of the following is considered a denial of service DoS attack? ›

There are two general methods of DoS attacks: flooding services or crashing services. Flood attacks occur when the system receives too much traffic for the server to buffer, causing them to slow down and eventually stop. Popular flood attacks include: Buffer overflow attacks – the most common DoS attack.

What is a denial of service DoS attack quizlet? ›

Denial of service (DoS) attack means an attack designed to overwhelm the target system so it can no longer reply to legitimate requests for connection.

What is a denial of service DoS attack Why would these attacks be useful to an attacker? ›

A Denial of Service (DoS) attack is a malicious attempt to affect the availability of a targeted system, such as a website or application, to legitimate end users. Typically, attackers generate large volumes of packets or requests ultimately overwhelming the target system.

What is a DDoS attack in cloud security? ›

A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.

What is the most common denial of service attack? ›

ARP spoofing is a common DoS attack that involves a vulnerability in the ARP protocol that allows an attacker to associate their MAC address to the IP address of another computer or gateway, causing traffic intended for the original authentic IP to be re-routed to that of the attacker, causing a denial of service.

What is the main objective of a denial of service DoS attack? ›

A denial of service (DoS) attack is an attempt to overload a website or network, with the aim of degrading its performance or even making it completely inaccessible.

What is a real life example of a DoS attack? ›

What is a real-life example of a DoS attack? One notable example of a denial of Service (DoS) attack is the “Mirai” botnet attack, which occurred in October 2016. Here's how it unfolded: The Mirai botnet targeted Internet of Things (IoT) devices, such as IP cameras, routers, and digital video recorders (DVRs).

What is the meaning of DDoS? ›

Distributed denial of service (DDoS) attacks are a subclass of denial of service (DoS) attacks. A DDoS attack involves multiple connected online devices, collectively known as a botnet, which are used to overwhelm a target website with fake traffic.

What is a typical defense against denial of service DoS attacks? ›

One of the most effective ways of protecting your network against DoS attacks is to reduce the attack surface via microsegmentation. At Byos, we use endpoint microsegmentation to shrink network exposure to its most defensible component and optimize its resilience to attack.

What is an example of denial-of-service DoS attacks? ›

Attackers achieve this by sending more traffic than the target can handle, causing it to fail—making it unable to provide service to its normal users. Examples of targets might include email, online banking, websites, or any other service relying on a targeted network or computer.

What is a denial-of-service DoS attack usually used to block? ›

A denial-of-service condition is accomplished by flooding the targeted host or network with traffic until the target cannot respond or simply crashes, preventing access for legitimate users. DoS attacks can cost an organization both time and money while their resources and services are inaccessible.

Which security principle is affected by the denial-of-service DoS attack? ›

DDoS attacks are one of the most effective ways for malicious actors to violate availability, the third of three foundational security principles—confidentiality, integrity, and availability—in what is known as the CIA triad.

What is a denial of service attack in Quizlet? ›

Denial-of-Service Attack. An action that prevents or impairs the authorized use of networks, systems, or applications by exhausting resources such as central processing units (CPU), memory, bandwidth, and disk space.

What happens during a denial of service DoS attack? ›

A denial-of-service (DoS) attack is a cyberattack on devices, information systems, or other network resources that prevents legitimate users from accessing expected services and resources. This is usually accomplished by flooding the targeted host or network with traffic until the target can't respond or crashes.

Which of the following is a type of denial of service DoS attack? ›

A SYN flood attack is a type of DoS attack where an attacker sends a large number of SYN (synchronize) packets to a target system, overwhelming its resources and causing it to become unresponsive or inaccessible to legitimate users.

What is a denial of service attack in cyber crime? ›

denial of service attack (DoS attack), type of cybercrime in which an Internet site is made unavailable, typically by using multiple computers to repeatedly make requests that tie up the site and prevent it from responding to requests from legitimate users.

What is a DDoS denial of service attack and how will we prevent from this in our applications? ›

A distributed denial-of-service (DDoS) attack disrupts the operations of a server, service, or network by flooding it with unwanted Internet traffic. At their worst, these attacks can knock a website or entire network offline for extended periods of time.

What can a DDoS attack cause? ›

A DDoS attack depletes the server resources and increases the website load time. When a DDoS attack hits a website, it may suffer performance issues or crash the server completely by overwhelming the server' resources such as CPU, memory or even the entire network.

What does a DDoS attack look like? ›

Slow or unresponsive servers, including “too many connections” error notices. A flood of traffic coming from a single device type, geolocation, or web browser version. 500 internal server errors status codes. 503 errors on your website.

What are the three basic types of denial of service attack? ›

DoS attacks can be broadly classified into volume-based attacks, protocol attacks, application layer attacks, and Advanced Persistent DoS (APDoS). Notable DoS attacks, such as those against Dyn and GitHub, have caused significant disruption to major internet platforms and services.

What is a DoS and DDoS attack? ›

A denial-of-service (DoS) attack floods a server with traffic, making a website or resource unavailable. A distributed denial-of-service (DDoS) attack is a DoS attack that uses multiple computers or machines to flood a targeted resource.

How does a DDoS attack work? ›

A Distributed Denial of Service (DDoS) attack is designed to force a website, computer, or online service offline. This is accomplished by flooding the target with many requests, consuming its capacity and rendering it unable to respond to legitimate requests.

What to do during a DDoS attack? ›

Change the DNS record(s) for the domain(s)

Modifying the DNS records for your domains can provide temporary relief from the attack. By redirecting traffic to alternative servers or employing a content delivery network (CDN), you can distribute the load and mitigate the impact.

What is a DoS attack on my router? ›

A “denial-of-server” attack is an explicit attempt to deny legitimate users from using a service or computer resource. DoS/DDoS attempts to reach below three goals to make victim/system/server fail to provide service.

Why would a DoS attack be performed? ›

Many attackers conduct DoS or DDoS attacks to deflect attention away from their intended target and use the opportunity to conduct secondary attacks on other services within your network.

Top Articles
Latest Posts
Article information

Author: Corie Satterfield

Last Updated:

Views: 6548

Rating: 4.1 / 5 (42 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Corie Satterfield

Birthday: 1992-08-19

Address: 850 Benjamin Bridge, Dickinsonchester, CO 68572-0542

Phone: +26813599986666

Job: Sales Manager

Hobby: Table tennis, Soapmaking, Flower arranging, amateur radio, Rock climbing, scrapbook, Horseback riding

Introduction: My name is Corie Satterfield, I am a fancy, perfect, spotless, quaint, fantastic, funny, lucky person who loves writing and wants to share my knowledge and understanding with you.