Why these DOS attacks were more SUCCESSFUL ? - BLOG 1

  

Overview about DOS Attacks

when considering the current cyber security terminology Denial of Service (DOS) attacks are found as the most common type of attack when compared to other attacks such as Man In the Middle, SQL injection, Phishing and etc. A DOS attack will make the systems inaccessible to the users who are typically using them. Thus, it causes downtime and make severe damage to the real-time systems. DoS attackers commonly target high-profile Web servers such as banks, trading corporations, media companies, government institutions, and trade organizations. Here we discuss a comprehensive idea of what is a DOS attack and how it happens. Further, the DOS attacks that occurred in the last few years with their specialties finally give the reasons for the success of these attacks.




 

Effect of DOS Attacks ...

The attacks of Denial of Service (DOS) try to prohibit the typical system users' operation. Such kinds of attacks do not attempt to compromise the systems and gain sensitive data but aim to block legitimate users from accessing them. DOS attacks are found as the most common sort of system attack. The reason for this is that performing a DOS attack is more easily according to the cyber security specialist's side than other forms of attack. This makes it easy for attackers with minimal technical expertise to perform a DOS attack. Any type of device can have operational limitations, this is the foundation concept of the DOS attacks. This fact is applicable not only to computers but also to any type of device. Because there is a limit to what can handle by a computer, web server, network, or any system. These limits can be; the amount of stored data, number of accessible users, data transmission speed and etc. Exceeding these limits may cause the systems to stop the typical working process. As an example, if a web server is flooded with an unbearable number of requests the web browser will be stuck and stop responding. This is what generally happens in DOS attacks, an uncountable number of requests overload the systems and cause them to deny access to legitimate users. There are several types of DOS attacks. Those are SYN flood, Smurf attack, Ping of death, and UDP flood.
In the next blog, lets see successful DOS attacks that happened last few years ...


Post a Comment

0 Comments