denial-of-service attack


Also found in: Encyclopedia, Wikipedia.
Related to denial-of-service attack: Distributed Denial of Service Attack

denial-of-service attack

n. Computers
A malicious attack on a network resource that prevents legitimate users from accessing the resource, typically implemented by initiating an overwhelming number of spurious requests for service. Also called DoS attack.
References in periodicals archive ?
Hence, a Denial-Of-Service attack cannot be undertaken and would have no effect.
We are defending against a denial-of-service attack, and will update status again shortly," blogged Twitter on its official blog.
A fire, power failure or theft of hardware can shut down a computer system just as effectively as malicious code or a denial-of-service attack.
When the attached file 'Document<random number>' is launched, Netsky-R attempts to launch a denial-of-service attack against several websites and attempts to delete a number of registry entries, including some related to the Bagle family of worms.
We are still working on it, but based on what we've observed so far it definitely seems to have a component that does a denial-of-service attack against the SCO.
Clarke cited a November denial-of-service attack designed to bring down the Internet.
According to Microsoft, the latest problem was caused by a denial-of-service attack against its routers, which resulted in 'intermittent' access to certain Microsoft sites throughout the morning.
ITTI), which suffered a denial-of-service attack that disabled its Web site earlier this year, the ECTF offers expertise in computer forensics beyond the scope of what some local law enforcement agencies can provide.
These include maintaining a minimum of two physically and geographically separate servers to help thwart a denial-of-service attack, and proper configuration of your Primary and Secondary name servers to utilize the natural resiliency of DNS.
Due to the criticality of Microsoft Exchange and Outlook to most corporations, ISS' X-Force(R) research and development team has deemed this vulnerability to be very serious, since exploitation of this flaw can be used to launch a denial-of-service attack that causes Exchange to crash.
By exploiting the flaw, the attacker steals the log-on privileges of the user and can then use the machine to perform a denial-of-service attack or execute other malicious code remotely.
An attack on a VoIP network might begin as a malicious denial-of-service attack on a SIP server, or when a worm infected subscriber unknowingly begins to flood the network with traffic.