Denial-of-service attack
CYBER ATTACK DISRUPTING SERVICE BY OVERLOADING THE PROVIDER OF THE SERVICE
Distributed denial of service attack; Denial of Service; Distributed denial-of-service; Distributed denial-of-service attack; DoS; Distributed denial of service; Denial-of-service; Nuke (computer); DDoS; DDOS; Ddos; DOS attack; Denial of service attack; Denial of service; DoS attack; Distributed Reflection Denial of Service; DoS attacks; Distributed Denial of Service; Dos attack; Teardrop attack; DDoS attack; Ddos attack; "pulsing" zombies; Distributed reflector denial of service; Denial-of-service attacks; Dos (attack); Network flood; Flood attack; RDDoS; Denial or Service; Teardrop (computing); Denial-of-Service attack; Distributed Denital of Service; DDos Attack; DRDoS; Denial of Service (computing); Backscatter (DDOS); Permanent denial of service; Pdos; Distributed-denial-of-service; DoS-attack; Degradation-of-service; Degradation-of-service attack; Reflector router; VIPDoS; TearDrop; Teardrop Attacks; Udp bomb attack; DDos; DDos by nuke attack; Denial of service attacks; Low Impact Ion Cannon; DDOS attack; Denial-of-Service; Distributed Deinal-of-Service; DDoSing; Shrew attack; Application layer DDoS attack; Wikipedia talk:Articles for creation/stresser; Volumetric DDoS attack; RUDY; DNS amplification attack; DD4BC; DDoS for Bitcoin; Booter service; Reflected denial-of-service attack; DDoS attacks; DoS-Attack; Denial-of-access attack; Stresser; DDOS protection; Denial of Service attack; SACK panic; SACKPanic; SACK Panic; Distributred denial of service attack; DDoS detection; Amplification attack; Distributed reflective denial of service
In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled.