4 Knowledge Base

 

 TelecomTrainning.net > Knowledge Base
 Viewing KB Article
Good Afternoon, - Please register or - log-in to your account.
Search
Search   Saved Questions   Ask a question
Keywords 
 
Available categories
LTE
100 of Questions in LTE
CCNA Certification
CCNA Sample Q & A (1000 + Q &A)
(Network +) Certification
(Network +) Sample Q & A (1000 + Q &A)
Networking
General/Interview Q& A on Networking
Home Networking
General/Interview Q& A on Networking
VOIP, SIP & Asterisk
Q & A on VOIP,Ethereal, SIP & Asterisk
Telecom Test Equipments
Q & A on Telecom Test Equipment
PSTN / Wireline
General / Interview Q & A on PSTN / Wireline
LTE, Wireless, 3G ,Diameter and HSS
General/Interview Q & A on LTE, Wireless, 3G ,Diameter and HSS
Telecom General
Any Q & A in Telecom in General

Top Questions
Friends, Describe Secure storage and distribution of A-Keys?
what is the difference between E1 signal & Ethernet signal ?
How do I monitor SS7 Traffic in spectra2?
Can you tell me about PBGT?
Explain me the difference between a repeater, bridge and router? Relate this to the OSI model.
What is the difference between BRI & PRI ?
Guys what is the purpose of Umbrella Cell Approach in GSM ?
how can we explain media gateway in MSc?
What is the difference between Electrical-tilt and Mechanical-tilt of an antenna?
What is GGSN?
What is BSC?
What is demarc point?
Can any one explain me how sms flow will work using ss7 network ?( from physical layer to application layer)
why cellphone towers are painted in red and white?
Explain SLTA and SLTM messages in MTP3?
Hi guys what is WAP?
wat is the difference betweem MSC & GMSC, & MSS & GCS?
what is EDAp? what is the functions of EDAP?
What is a circuit id?
what is sdh?

What is DoS - Denial of Service?
elvin 24-October-2008 01:04:12 PM

Comments


The term Denial of Service (DoS) refers to a form of attacking computer systems over a network. DoS is normally a malicious attempt to render a networked system unusable (though often without permanently damaging it).

Denial of service relies on methods that exploit the weaknesses of network technology. For example, one common form of DoS is Ping of Death. Ping of Death attacks work by generating and sending certain kinds of network messages that are technically unsupported but known to cause problems for systems that receive them. Denial of service attacks like Ping of Death may crash or "hang" computers. Other DoS attacks may simply fill or "flood" a network with useless data traffic, rendering systems incapable of acting on bona fide requests.

DoS attacks are most common against Web sites that provide controversial information or services. The commerical cost of such attacks can be very large. DoS may also occur unintentionally when developing or upgrading network systems.
Also Known As: Denial of Service, Distributed Denial of Service (DDoS)
Posted by saqlain231


Action(s) which prevent any part of an AIS from functioning in accordance with its intended purpose.
Posted by HamidAliKhan


A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted, malevolent efforts of a person or persons to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even DNS root servers.

One common method of attack involves saturating the target (victim) machine with external communications requests, such that it cannot respond to legitimate traffic, or responds so slowly as to be rendered effectively unavailable. In general terms, DoS attacks are implemented by either forcing the targeted computer(s) to reset, or consume its resources so that it can no longer provide its intended service or obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately.

Denial-of-service attacks are considered violations of the IAB's Internet Proper Use Policy. They also commonly constitute violations of the laws of individual nations
Posted by sagitraz


http://compnetworking.about.com/od/networksecurityprivacy/g/denialofservice.htm
Posted by eric

Q&A Rating

Q&A Rating
Rate This Question and Answer

Related Questions
Can anybody help me describing the purpose and basic functionality of things like HSRP, VRRP etc?
 
Which command displays the syntax for the clock command?
 
What are Cell Phone Jammer?
 


Search questions via popularity
Top viewed questions  Top emailed questions  Most printed questions  Most saved questions
 
Copyright © Telecom Training, All Rights Reserved