A Denial of Service attack is made to deny access to authorised users of a particular website or server or database. It is a made with a malicious intent by hackers in order to prevent access to the website ranging from few hours to days. A Denial of service attack is done by a hacker with one single system by exploiting the TCP/IP of the server. In a DoS attack the resources of the server are used up to such an extent that it crashes the whole server and prevents any authorised user from accessing the website. This DoS attack becomes conspicuous when the website takes a very long time to load or does not open at all.

A DoS attack is initiated by sending multiple ping request from a computer to a website which results in using up of the server’s resources such as CPU, memory and bandwidth to the maximum extent that the server could not handle which results in the stoppage in functioning of the website. Usually, a user sends a request to the server though the website for which the server sends back an acknowledgment and in reply to this the user’s computer sends the receipt of the acknowledgement after which the server waits for input from the user. A hacker exploits the last stage of this process by sending multiple requests and not sending any inputs at the end which makes the server wait for the input and these multiple inputs result in overloading the server’s resources resulting in a crash.

The DoS attacks have been prevented due to the advancement in the cyber-security space. However, the hackers have found a novel method call DDos (Distributed Denial of Service) which uses multiple infected computers across the world called botnets to send enormous amounts of requests to the servers resulting ultimately in crashing of the server. The number of computers which are involved in this hacking process ranges from a few hundred to a few thousands.

The motive behind DDoS attacks include financial reasons such as lowering the market value of a competitor or to attack people whose ideologies are different from that of the hacker (or the organization that hired the hacker) or it may be done just for the sake of fun by the hacker.

About Us

We speak the language of Technology & Internet. We understand how the law interacts with Technology & Internet. Cyber Crime Chambers is a boutique firm specializing in internet laws and digital forensic evidence.

image
Karthikeyan.N

B.A., B.L., (Hons) IPDP., (London)
Pgd IPR., Pgd Cyber Law., Msc., (IT)
CCI., CFA., IPCL.,
Advocate, Madras High Court

Karthikeyan, is a renowned cyber law expert, who is also the Managing Partner of Law Office of Karthikeyan, a reputed law firm based in Chennai.

More About Us
Report

Report an Incident

Send us information about your case, we will respond to you promptly

SUBMIT ONLINE