CybersecurityOffensive Security

Denial of Service Attack

Overview

Direct Answer

A Denial of Service (DoS) attack is a malicious attempt to render a computer system, service, or network temporarily or permanently unavailable by flooding it with excessive traffic or exploiting resource limitations. Distributed variants (DDoS) amplify impact by orchestrating the attack across multiple source machines.

How It Works

Attackers inundate target systems with requests—whether HTTP floods, SYN floods, UDP packets, or DNS queries—faster than the infrastructure can process them. Resources such as bandwidth, CPU, or connection pools become exhausted, causing legitimate requests to be dropped or delayed. Some attacks exploit protocol weaknesses or application-layer logic rather than relying on volume alone.

Why It Matters

Organisations face direct revenue loss, reputational damage, and operational downtime when services become inaccessible. Compliance obligations under data protection regulations may be triggered if availability requirements are breached. Financial services, e-commerce, and critical infrastructure sectors face particularly severe business continuity risks.

Common Applications

Attackers target web servers, DNS infrastructure, APIs, and cloud platforms. Incidents affect financial institutions during market-sensitive periods, online retailers during peak shopping events, and gaming services. Ransom-motivated groups sometimes combine these attacks with extortion demands.

Key Considerations

Distinguishing legitimate traffic spikes from attack patterns remains challenging; mitigation requires balancing protection with access availability. Attack sophistication continues to evolve, rendering static defences inadequate without continuous monitoring and adaptive response strategies.

More in Cybersecurity

AI-Powered Threat Detection

Offensive Security

Security systems that leverage machine learning and behavioural analytics to identify sophisticated cyber threats, anomalous patterns, and zero-day attacks in real time.

Next-Generation Firewall

Defensive Security

An advanced firewall that goes beyond traditional packet filtering to include application awareness and intrusion prevention.

Zero Trust Architecture

Network Security

A security model that requires strict identity verification for every person and device accessing resources regardless of location.

DevSecOps

Security Governance

An approach integrating security practices within the DevOps process, making security a shared responsibility.

Cloud-Native Application Protection

Offensive Security

An integrated security platform that protects cloud-native applications across the full lifecycle, combining workload protection, configuration management, and runtime security.

Firewall

Network Security

A network security device that monitors and filters incoming and outgoing network traffic based on security rules.

Cloud Security Posture Management

Security Governance

Automated tools that continuously assess cloud infrastructure configurations against security best practices and compliance requirements, identifying and remediating misconfigurations.

Attack Surface Management

Offensive Security

The continuous discovery, inventory, classification, and monitoring of all external-facing digital assets to identify and reduce an organisation's exposure to cyber threats.