IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Denial of Service Attacks

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Distributed Denial of Service Attacks, Teardrop Attacks, Denial of Service Prevention, DOSA, Packet Monkey, Attacks, DDoS Attacks, DNS Attacks, Smurfing, Denial-of-service Attack, D o S Attacks, DoS Attacks, Smurf
DEFINITION: On the Internet, a packet monkey is someone (see cracker, hacker, and script kiddy) who intentionally inundates a Web site or network with data packets, resulting in a denial-of-service situation for users of the attacked site or network. Packet monkeys typically use tools created and made available on the Internet by hackers. According to one writer's distinction, a packet monkey, unlike a script  … 
Definition continues below.
Denial of Service Attacks Multimedia (View All Report Types)
3 Matches
Up-to-the-Minute Global Threat Intelligence
sponsored by IBM
WEBCAST: In this webcast, you'll learn how stay informed with up to the minute cybercrime attack information.
Posted: 30 Jul 2015 | Premiered: Jul 17, 2015

IBM

WAN Security: Making the Right Choices for an Optimized WAN
sponsored by XO Communications
WEBCAST: This webinar discusses the recent trends in WAN security, new and upcoming threats, and best practices for making well-informed WAN security decisions for your enterprise.
Posted: 03 May 2012 | Premiered: Apr 30, 2012

XO Communications

Cisco CleanAir Technology
sponsored by Cisco Systems, Inc.
WEBCAST: Watch now to learn how you can balance anywhere, any device, any time access with the policy controls you need and also offering a high-quality end-user experience.
Posted: 02 Mar 2012 | Premiered: Mar 2, 2012

Cisco Systems, Inc.
3 Matches
 
DENIAL OF SERVICE ATTACKS DEFINITION (continued): …  kiddy, leaves no clues as to who is making the exploit, making the identity of a packet monkey more difficult to trace. In addition, a denial-of-service attack can be launched on a wider scale than attacks performed by script kiddies, making them more difficult to investigate. Hackers look down on packet monkeys and often describe them as "bottom feeders." Because a packet monkey uses tools created by others, the packet monkey has little understanding of the harm that may be caused. Typically, packet monkey exploits are random and without any purpose other than the thrill of making an effect. … 
Denial of Service Attacks definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement