Overview
Direct Answer
A Denial of Service (DoS) attack is a malicious attempt to render a computer system, service, or network temporarily or permanently unavailable by flooding it with excessive traffic or exploiting resource limitations. Distributed variants (DDoS) amplify impact by orchestrating the attack across multiple source machines.
How It Works
Attackers inundate target systems with requests—whether HTTP floods, SYN floods, UDP packets, or DNS queries—faster than the infrastructure can process them. Resources such as bandwidth, CPU, or connection pools become exhausted, causing legitimate requests to be dropped or delayed. Some attacks exploit protocol weaknesses or application-layer logic rather than relying on volume alone.
Why It Matters
Organisations face direct revenue loss, reputational damage, and operational downtime when services become inaccessible. Compliance obligations under data protection regulations may be triggered if availability requirements are breached. Financial services, e-commerce, and critical infrastructure sectors face particularly severe business continuity risks.
Common Applications
Attackers target web servers, DNS infrastructure, APIs, and cloud platforms. Incidents affect financial institutions during market-sensitive periods, online retailers during peak shopping events, and gaming services. Ransom-motivated groups sometimes combine these attacks with extortion demands.
Key Considerations
Distinguishing legitimate traffic spikes from attack patterns remains challenging; mitigation requires balancing protection with access availability. Attack sophistication continues to evolve, rendering static defences inadequate without continuous monitoring and adaptive response strategies.
More in Cybersecurity
AI-Powered Threat Detection
Offensive SecuritySecurity systems that leverage machine learning and behavioural analytics to identify sophisticated cyber threats, anomalous patterns, and zero-day attacks in real time.
Next-Generation Firewall
Defensive SecurityAn advanced firewall that goes beyond traditional packet filtering to include application awareness and intrusion prevention.
Zero Trust Architecture
Network SecurityA security model that requires strict identity verification for every person and device accessing resources regardless of location.
DevSecOps
Security GovernanceAn approach integrating security practices within the DevOps process, making security a shared responsibility.
Cloud-Native Application Protection
Offensive SecurityAn integrated security platform that protects cloud-native applications across the full lifecycle, combining workload protection, configuration management, and runtime security.
Firewall
Network SecurityA network security device that monitors and filters incoming and outgoing network traffic based on security rules.
Cloud Security Posture Management
Security GovernanceAutomated tools that continuously assess cloud infrastructure configurations against security best practices and compliance requirements, identifying and remediating misconfigurations.
Attack Surface Management
Offensive SecurityThe continuous discovery, inventory, classification, and monitoring of all external-facing digital assets to identify and reduce an organisation's exposure to cyber threats.