A denial of service attack is an incident in which a user or organization is deprived of the services of a resource they would normally expect to have. In a distributed denial of service, large numbers of compromised systems (sometimes called a botnet) attack a single target.
A denial of service attack doesn’t normlly lead to theft of information or security loss however it may cause the victim to be unable to access certain programs or networks whilst under attck or afterwards. An example is you may loss access to e-mail or other things which you would need to log on to. A denial of service attack can also destroy programming and files in affected computer systems. In some cases, D of S attacks have forced Web sites accessed by millions of people to temporarily cease operation.
A recent case where this has happened was when the London 2012 olympic tickets went on sale and millions of people all tried to access the website at the same time, casueing it to overload and cease to work for a time. That was an unorganised denial of service attack although D of S attacks can be organised by groups of people to affect a website or program.
Common types of Denial of service attacks are:
>Buffer Overflow Attacks
-to send more traffic to a network address than the programmers who planned its data buffers anticipated someone might send.
>SYN Attack
-attacker can send a number of connection requests very rapidly and then fail to respond to the reply. This leaves the first packet in the buffer so that other, legitimate connection requests can’t be accommodated.
>Teardrop Attack
-exploits the way that the Internet Protocol (IP) requires a packet that is too large for the next router to handle be divided into fragments. The fragment packet identifies an offset to the beginning of the first packet that enables the entire packet to be reassembled by the receiving system.
>Smurf Attack
-the perpetrator sends an IP ping (or “echo my message back to me”) request to a receiving site The ping packet specifies that it be broadcast to a number of hosts within the receiving site’s local network.
>Viruses
-which replicate across a network in various ways, can be viewed as denial-of-service attacks where the victim is not usually specifically targetted but simply a host unlucky enough to get the virus.
>Physical Infrastructure Attacks
-someone may simply snip a fiber optic cable. This kind of attack is usually mitigated by the fact that traffic can sometimes quickly be rerouted.