Denial-of-Service Attack


A Denial-of-Service (DoS) Attack is a cyber attack in which the perpetrator makes a network or machine unavailable to its intended users. This is typically accomplished by flooding the targeted system with superfluous requests to overload its capacity or cause a shutdown. The primary goal is to disrupt the system’s normal functioning, often leading to denial of service for users of the targeted system.


The phonetics of “Denial-of-Service Attack” is: /dɪˈnaɪəl ʌv ˈsɜːrvɪs əˈtæk/

Key Takeaways

  1. Denial-of-Service Attack: This is an aggressive cyber attack aimed at making a website, service or network resource unavailable to its intended users. This is often achieved by overloading the target with a flood of internet traffic.
  2. Impact of Denial-of-Service Attack: These attacks can cause significant disruption to businesses or individuals by causing their online services to go down. It can also serve as a distraction for other malicious activities and can lead to loss of revenue and damage to the brand’s reputation.
  3. Prevention and Mitigation: Methods to prevent and mitigate DoS attacks include deploying anti-DDoS technology, implementing robust firewall rules, keeping systems up-to-date, and utilizing intrusion detection systems. It’s also beneficial to have a plan in place to deal with such attacks immediately and efficiently when they occur.


The term: Denial-of-Service Attack (DoS attack) is crucial in technology because it refers to a malicious attempt to disrupt the normal functioning of a network, service, or website, by overwhelming the targeted server with a flood of internet traffic. In the digital era where data exchange and online services are vital for businesses and individuals, a successful DoS attack can cause significant data losses, financial impacts, and damage to an organization’s reputation. Therefore, understanding and mitigating the risk of DoS attacks is of integral importance in maintaining network security and uninterrupted operation of online services.


A Denial-of-Service (DoS) attack is a malicious attempt aimed at disrupting the normal functionality of a network, service, or system by overwhelming it with a flood of internet traffic. The purpose of this type of cyberattack is primarily to render a website or service inaccessible, thereby causing inconvenience, loss of revenue, or damage to the brand reputation of the targeted business or entity. Attackers may not necessarily seek to gain unauthorized access or steal information, but rather aim to disrupt the service to cause harm to their victim’s business or service.DoS attacks can be used by unscrupulous competitors, hackers with a grudge, or cybercriminals who wish to extort money from businesses that cannot afford a lengthy downtime. They are often accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled. This deluge of requests can cause a system to slow down or even crash and shut down, thereby denying service to legitimate users or systems. Therefore, a DoS attack serves as a potent tool for cyber attackers to harm businesses or services online.


1. Dyn Attack (2016): One of the most massive DDoS attacks in history occurred in 2016 when a botnet attacked the domain name system provider Dyn. The attack caused major disruptions in the services of major websites like Twitter, Amazon, Netflix, Reddit, and others, which relied on Dyn for DNS services.2. GitHub Attack (2018): GitHub, a major code repository hosting service, was hit with a DDoS attack that sent a staggering 1.35 terabits of traffic per second to their website, causing a service outage. The attackers exploited memcached servers to amplify the attack traffic.3. Estonia Cyber Attack (2007): After a dispute with Russia, the country of Estonia was hit by a series of DDoS attacks over a few weeks. The attack targeted the websites of government departments, financial institutions, telecommunication companies, and media outlets, leading to a serious disruption in many online services. This incident is considered one of the first examples of cyberwarfare between states.

Frequently Asked Questions(FAQ)

**Q: What is a Denial-of-Service Attack?**A: A Denial-of-Service (DoS) attack is a type of cyber attack where the perpetrator seeks to make a machine or network resource unavailable to its intended users by disrupting services of a host connected to the Internet. **Q: How are Denial-of-Service Attacks carried out?**A: DoS attacks are typically executed by overwhelming the target with superfluous requests in an attempt to overload the system. In a Distributed Denial-of-Service Attack (DDoS), the incoming traffic comes from many different sources, making it impossible to stop the attack simply by blocking a single IP address.**Q: What is the impact of a Denial-of-Service Attack?**A: The primary impact of a DoS attack is the disruption of legitimate traffic to the targeted network or website, causing inconvenience to its users. In extreme cases, businesses may incur significant financial losses due to downtime and potential loss of customer trust. **Q: Who can be a target of a Denial-of-Service Attack?**A: Any individual, business, or organization with a presence on the internet could potentially be targeted by a DoS attack. However, entities such as businesses, government agencies and service providers are generally more at risk, due to the higher impact and visibility.**Q: How can one protect themselves from a Denial-of-Service Attack?**A: Protective measures can include having redundant and robust network architecture, employing DoS protection services, effectively configuring network firewalls, and maintaining strong security policies.**Q: What should be done if one is under a Denial-of-Service Attack?**A: If you are under a DoS attack, try to identify the type of attack and its source. Contact your internet service provider immediately, and consider reaching out to authorities. Retaining the services of a company that specializes in mitigating DoS attacks may also be worthwhile.

Related Finance Terms

  • Distributed Denial-of-Service (DDoS)
  • Botnet
  • Traffic Flooding
  • IP address spoofing
  • SYN flood attack

Sources for More Information


About The Authors

The DevX Technology Glossary is reviewed by technology experts and writers from our community. Terms and definitions continue to go under updates to stay relevant and up-to-date. These experts help us maintain the almost 10,000+ technology terms on DevX. Our reviewers have a strong technical background in software development, engineering, and startup businesses. They are experts with real-world experience working in the tech industry and academia.

See our full expert review panel.

These experts include:


About Our Editorial Process

At DevX, we’re dedicated to tech entrepreneurship. Our team closely follows industry shifts, new products, AI breakthroughs, technology trends, and funding announcements. Articles undergo thorough editing to ensure accuracy and clarity, reflecting DevX’s style and supporting entrepreneurs in the tech sphere.

See our full editorial policy.

More Technology Terms

Technology Glossary

Table of Contents