MSU logo
MSU logo
LOG IN
Jump to Header Jump to Main Content Jump to Footer
MSU logo
  • Home
  • Share
  • Connect
  • Grow
    • Feed
    • Browse
  • Events
  • Thank an Educator
  • Center for T&LI
  • Mediaspace
  • MSU Commons
  • Getting Started
  • Help
MSU logo
Back

Denial-of-Service (DoS) Attack

playlist image

Denial-of-Service (DoS) Attack

A denial-of-service (DoS) attack is an intentional cyberattack carried out on networks, websites, and online resources to restrict access to its legitimate users.
This is usually done by overloading the target network or site with fake system requests, preventing legitimate users from accessing it, sometimes crashing or damaging a system outright. DoS attacks may last anywhere from a few hours to many months.
+ view more

profile-img
Posted by
Rupali Jagtap

{"id"=>1296, "level_no"=>1, "level_title"=>"How Denial-of-Service Attacks Work", "notes"=>"<p id=\"mntl-sc-block_1-0-8\" class=\"comp mntl-sc-block finance-sc-block-html mntl-sc-block-html\">DoS attacks are on the rise because as businesses and consumers use more digital platforms in communicating and transacting with each other, these cyberattacks&nbsp;target&nbsp;digital intellectual property and infrastructures. Cyberattacks are typically launched to steal&nbsp;<a href=\"https://www.investopedia.com/terms/p/personally-identifiable-information-pii.asp\" rel=\"noopener noreferrer\" data-component=\"link\" data-source=\"inlineLink\" data-type=\"internalLink\" data-ordinal=\"1\">personally identifiable information (PII)</a>, causing considerable damages to the businesses&rsquo; financial pockets and reputations.&nbsp;<a href=\"https://www.investopedia.com/terms/d/data-breach.asp\" rel=\"noopener noreferrer\" data-component=\"link\" data-source=\"inlineLink\" data-type=\"internalLink\" data-ordinal=\"2\">Data breaches</a>&nbsp;can target a specific company or a host of companies at the same time. A company with high-security protocols in place may be attacked through a member of its&nbsp;<a href=\"https://www.investopedia.com/terms/s/supplychain.asp\" rel=\"noopener noreferrer\" data-component=\"link\" data-source=\"inlineLink\" data-type=\"internalLink\" data-ordinal=\"3\">supply chain</a>&nbsp;with inadequate security measures. When multiple&nbsp;<a href=\"https://www.investopedia.com/terms/c/company.asp\" rel=\"noopener noreferrer\" data-component=\"link\" data-source=\"inlineLink\" data-type=\"internalLink\" data-ordinal=\"4\">companies</a> have been selected for an attack, the perpetrators can use a DoS approach.</p>\n<p class=\"comp mntl-sc-block finance-sc-block-html mntl-sc-block-html\">In a DoS attack, the cyber attackers typically use one internet connection and one device to send rapid and continuous requests to a target server to overload the server&rsquo;s bandwidth. DoS attackers exploit a software vulnerability in the system and proceed to exhaust the RAM or CPU of the server. The damage in loss of service done by a DoS attack can be fixed in a short time by implementing a firewall with allowing and deny rules. Since a DoS attack only has one <a href=\"https://www.investopedia.com/terms/i/ip-address.asp\" rel=\"noopener noreferrer\" data-component=\"link\" data-source=\"inlineLink\" data-type=\"internalLink\" data-ordinal=\"1\">IP address</a>, the IP address can be easily fished out and denied further access using a firewall.</p>", "challenge_id"=>586, "created_at"=>Fri, 15 Jan 2021 07:58:31.619861000 UTC +00:00, "updated_at"=>Fri, 15 Jan 2021 07:58:31.619861000 UTC +00:00}

  • Playlist Sections
  • How Denial-of-Service Attacks Work
  • Distributed Denial-of-Service (DDoS) Attack

Description

DoS attacks are on the rise because as businesses and consumers use more digital platforms in communicating and transacting with each other, these cyberattacks target digital intellectual property and infrastructures. Cyberattacks are typically launched to steal personally identifiable information (PII), causing considerable damages to the businesses’ financial pockets and reputations. Data breaches can target a specific company or a host of companies at the same time. A company with high-security protocols in place may be attacked through a member of its supply chain with inadequate security measures. When multiple companies have been selected for an attack, the perpetrators can use a DoS approach.

In a DoS attack, the cyber attackers typically use one internet connection and one device to send rapid and continuous requests to a target server to overload the server’s bandwidth. DoS attackers exploit a software vulnerability in the system and proceed to exhaust the RAM or CPU of the server. The damage in loss of service done by a DoS attack can be fixed in a short time by implementing a firewall with allowing and deny rules. Since a DoS attack only has one IP address, the IP address can be easily fished out and denied further access using a firewall.

Description

A distributed denial-of-service (DDoS) attack uses multiple infected devices and connections spread around the world as a botnet. A botnet is a network of personal devices that have been compromised by cybercriminals without the knowledge of the owners of the devices. The hackers infect the computers with malicious software to gain control of the system to send spam and fake requests to other devices and servers. A target server that falls victim to a DDoS attack will experience an overload due to the hundreds or thousands of phony traffic that comes in. Because the server is attacked from multiple sources, detecting all the addresses from these sources may prove difficult. Separating legitimate traffic from the fake traffic may also be impossible to do, hence, another reason why it is hard for a server to withstand a DDoS attack. Unlike most cyberattacks that are initiated to steal sensitive information, initial DDoS attacks are launched to make websites inaccessible to their users. However, some DDoS attacks are used as a facade for other malicious acts. When servers have been successfully knocked down, the culprits may go behind the scenes to dismantle the websites’ firewalls or weaken their security codes for future attack plans.

The importance of Flowers in Our Daily Life
Hard work or smart work Hard work would mean spending long hours to complete my work without any shortcuts. It definitely ensures results but the process is long and stressful. Smart work would be aiming for the same results but with planning and prioritization of tasks. I think to answer this question, in today’s world, one has to redefine the terms ‘smart work’ and ‘hard work’. Most of us think of hard work to be a ‘physical activity’ and smart work to be a kind of ‘mental ability’. Although this was true before the age of the Internet, it no longer holds true. Excellence is all about doing smart work day in and day out. This in itself can be considered as hard work. In this industry, there is a lot of competition. The entire idea is to deliver fast and deliver the best to the clients. To keep delivering great work every day is hard work, but my agency has been winning the ‘Best Agency Award’ for the past few years and this is a commitment to excellence I carry with me too. Hence, I am sure I fall into the category of hard workers. I think to answer this question, in today’s world, one has to redefine the terms ‘smart work’ and ‘hard work’. Most of us think of hard work to be a ‘physical activity’ and smart work to be a kind of ‘mental ability’. Although this was true before the age of the Internet, it no longer holds true. Excellence is all about doing smart work day in and day out. This in itself can be considered as hard work. In this industry, there is a lot of competition. The entire idea is to deliver fast and deliver the best to the clients. To keep delivering great work every day is hard work, but my agency has been winning the ‘Best Agency Award’ for the past few years and this is a commitment to excellence I carry with me too. Hence, I am sure I fall into the category of hard workers. I think to answer this question, in today’s world, one has to redefine the terms ‘smart work’ and ‘hard work’. Most of us think of hard work to be a ‘physical activity’ and smart work to be a kind of ‘mental ability’. Although this was true before the age of the Internet, it no longer holds true. Excellence is all about doing smart work day in and day out. This in itself can be considered as hard work. In this industry, there is a lot of competition. The entire idea is to deliver fast and deliver the best to the clients. To keep delivering great work every day is hard work, but my agency has been winning the ‘Best Agency Award’ for the past few years and this is a commitment to excellence I carry with me too. Hence, I am sure I fall into the category of hard workers. I think to answer this question, in today’s world, one has to redefine the terms ‘smart work’ and ‘hard work’. Most of us think of hard work to be a ‘physical activity’ and smart work to be a kind of ‘mental ability’. Although this was true before the age of the Internet, it no longer holds true. Excellence is all about doing smart work day in and day out. This in itself can be considered as hard work. In this industry, there is a lot of competition. The entire idea is to deliver fast and deliver the best to the clients. To keep delivering great work every day is hard work, but my agency has been winning the ‘Best Agency Award’ for the past few years and this is a commitment to excellence I carry with me too. Hence, I am sure I fall into the category of hard workers.I think that smart work and hard work together make a genius. I am deeply inspired by three famous personalities – Albert Einstein, Michael Jordan and Warren Buffet. In their stories, it is clear that they spent years working hard in their respective fields and were able to produce results, that the world had never known before! Today, Warren Buffet can make smart judgments in the field of investments because he has worked hard to gain those skills. I do not shy away from hard work as I see that the end result will be my ability to work smartly and be the best in a particular field. My current manager would definitely say that I am a hard worker. Besides, once I pick up a new skill, I am quick to apply it to get quicker results, which kind of makes me a smart worker too! I think that smart work and hard work together make a genius. I am deeply inspired by three famous personalities – Albert Einstein, Michael Jordan and Warren Buffet. In their stories, it is clear that they spent years working hard in their respective fields and were able to produce results, that the world had never known before! Today, Warren Buffet can make smart judgments in the field of investments because he has worked hard to gain those skills. I do not shy away from hard work as I see that the end result will be my ability to work smartly and be the best in a particular field. My current manager would definitely say that I am a hard worker. Besides, once I pick up a new skill, I am quick to apply it to get quicker results, which kind of makes me a smart worker too! I think that smart work and hard work together make a genius. I am deeply inspired by three famous personalities – Albert Einstein, Michael Jordan and Warren Buffet. In their stories, it is clear that they spent years working hard in their respective fields and were able to produce results, that the world had never known before! Today, Warren Buffet can make smart judgments in the field of investments because he has worked hard to gain those skills. I do not shy away from hard work as I see that the end result will be my ability to work smartly and be the best in a particular field. My current manager would definitely say that I am a hard worker. Besides, once I pick up a new skill, I am quick to apply it to get quicker results, which kind of makes me a smart worker too!
Badge Image

Badge Description

A denial-of-service (DoS) is a form of cyberattack that prevents a rightful user from accessing a computer system, platform, or website. In a DoS attack, rapid and continuous online requests are sent to a target server in order to overload the server’s bandwidth.

Submission: Experience summary

Write a paragraph about what you learned.




×
Michigan State University Wordmark
  • Call us: (517) 355-5482
  • Contact Information
  • Site Map
  • Privacy Statement
  • Site Accessibility
  • Call MSU: (517) 355-1855
  • Visit: msu.edu
  • Notice of Nondiscrimination
  • CTLI events, programs, and activities are open to all MSU educators and students, who are encouraged to participate fully.
  • Spartans Will.
  • © Michigan State University
  • Subscribe to #iteachmsu Digest

Wizdn Watermark image


OK

OK
Cancel