IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Denial of Service Attacks

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Distributed Denial of Service Attacks, Teardrop Attacks, Denial of Service Prevention, DOSA, Packet Monkey, Attacks, DDoS Attacks, DNS Attacks, Smurfing, Denial-of-service Attack, D o S Attacks, DoS Attacks, Smurf
DEFINITION: A distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users.In a typical DDoS attack, a hacker (or, if you prefer, cracker) begins  … 
Definition continues below.
Denial of Service AttacksReports
1 - 25 of 69 Matches Previous Page  | Next Page
IBM X-Force Threat Intelligence Quarterly, 6/14: The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
sponsored by IBM
WHITE PAPER: This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
Posted: 24 Jul 2014 | Published: 30 Jun 2014

IBM

The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report
sponsored by Neustar®
WHITE PAPER: This white paper reveals valuable insights into the impact of DDoS smokescreening based on a survey of 440 North American companies.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

Neustar®

It's Time for a Serious Talk: 3 Questions to Ask Your DNS Host about Lowering DDoS Risks
sponsored by Neustar®
WHITE PAPER: This white paper provides answers to three questions about DDoS attacks that you need to ask your DNS host before, not after, your company becomes a target.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

Neustar®

The Anatomy of an Anonymous Attack
sponsored by Imperva
RESOURCE: This infographic depicts the timeline of attacks perpetrated by hacktivist group Anonymous, notorious for its DDoS attacks on controversial organisations around the world.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Imperva

Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This informative whitepaper explores survival tactics in the event of a web attack.
Posted: 07 Jul 2014 | Published: 07 Jul 2014

Imperva

MidWestern Community Bank Defends Againts Online Attacks
sponsored by Juniper Networks, Inc.
CASE STUDY: This case study examines a Midwestern community bank that has experienced DDoS attacks coming from a foreign country.
Posted: 27 Jun 2014 | Published: 31 Jan 2014

Juniper Networks, Inc.

5 DNS Security Risks That Keep You Up At Night
sponsored by Dyn
WHITE PAPER: This guide explores 5 DNS security risks and what you can do to prevent them.
Posted: 20 Jun 2014 | Published: 08 Jan 2014

Dyn

Mitigating Multiple DDoS Attack Vectors
sponsored by F5 Networks
WHITE PAPER: View this infographic to understand where DDoS are derived from, how to detect them, and how to mitigate multiple attack vectors.
Posted: 19 Jun 2014 | Published: 19 Jun 2014

F5 Networks

F5 DDoS Protection: Recommended Practices
sponsored by F5 Networks
WHITE PAPER: This exclusive white paper provides strategies used to combat DDoS attacks, particularly defense mechanisms.
Posted: 19 Jun 2014 | Published: 31 Dec 2012

F5 Networks

Denial-of-Service (DoS) Secured Virtual Tenant Networks (VTN)
sponsored by NEC Corporation of America
WHITE PAPER: This crucial paper discusses the evolution of DDoS attacks and examines an SDN solution that detects and mitigates potential attacks almost instantly, ensuring that your network is kept up and running.
Posted: 03 Jun 2014 | Published: 03 Jun 2014

NEC Corporation of America

Coming at You: How to Deal with the Latest DDoS Attacks
sponsored by SearchSecurity.com
EBOOK: Diversity. Usually it's a good thing, but not with distributed denial-of-service attacks, which are getting more varied and more lethal. Here's what to do about that.
Posted: 14 May 2014 | Published: 15 May 2014

SearchSecurity.com

Navigating Today's DDoS Landscape
sponsored by Ixia
WHITE PAPER: Learn more about distributed denial-of-service attacks, evolving security and mitigation solutions, and discover new best practices for preventing and responding to advanced attacks.
Posted: 02 May 2014 | Published: 02 May 2014

Ixia

Information Security Services: Preparing for Distributed Denial of Service (DDoS) Attacks
sponsored by Dell SecureWorks UK
WHITE PAPER: This essential whitepaper explores the current state of DDoS attacks and outlines why you need a proactive prevention strategy.
Posted: 01 Apr 2014 | Published: 28 Feb 2011

Dell SecureWorks UK

Design, Deploy, and Manage a DDoS Protection Architecture
sponsored by F5 Networks
WHITE PAPER: An increasing number of Distributed Denial-of-service (DDoS) attacks has caused many businesses to redesign their networks and better protect application-layer attacks. In this white paper, learn how a multi-tier DDoS protection architecture can help you protect your network and higher-layer application protocols from the four categories of DDoS.
Posted: 31 Mar 2014 | Published: 30 Nov 2013

F5 Networks

Four Ways DNS Can Accelerate Business Growth
sponsored by Neustar®
WHITE PAPER: This exclusive paper discusses the plethora of benefits that a robust and secure DNS can provide your organization. Read on to find out how you can significantly enhance your web experience for users, driving new streams of revenue.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Neustar®

Hackers, Hacking, and CEHv8
sponsored by Global Knowledge
WHITE PAPER: This resource addresses hackers, hacking, and what can be done to prevent cyber-attacks. It also highlights the different motives for hacking and common methods hackers use.
Posted: 19 Mar 2014 | Published: 21 Jan 2014

Global Knowledge

DDoS Mitigation and DNS Availability: Key Components of Your Resiliency Strategy
sponsored by Verisign, Inc.
WHITE PAPER: This white paper provides enterprises with a list of recommendations for ensuring resiliency and minimizing risk in the event of a DDoS or DNS attack.
Posted: 03 Mar 2014 | Published: 31 Dec 2013

Verisign, Inc.

DDoS Attacks: 5 Steps to Prepare
sponsored by Verisign, Inc.
WHITE PAPER: This helpful guide provides a number of considerations for your company to look over prior to a distributed denial of service (DDoS) attack in order to get your site back up and running as quickly as possible.
Posted: 03 Mar 2014 | Published: 31 Dec 2013

Verisign, Inc.

DDoS Malware: Strategies for Mitigation
sponsored by Verisign, Inc.
WHITE PAPER: This technical brief covers DDoS-enabled malware and several DDoS-specific tools, their capabilities, and the network indicators they generate while performing attack methods.
Posted: 28 Feb 2014 | Published: 31 Dec 2013

Verisign, Inc.

Combining Cloud-Based DDoS Protection and DNS Services to Thwart the Threat Of DDoS
sponsored by Verisign, Inc.
WHITE PAPER: This guide explores the keys to fighting sophisticated DDoS attacks and why cloud-based protection may be your best option.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

Verisign, Inc.

Network IPS Tested Against Latest Vulnerabilities and Attacks
sponsored by IBM
WHITE PAPER: This white paper serves as a guide to help you choose your intrusion prevention system (IPS) investment. Click through for information on a solution that passed essential test factors.
Posted: 20 Feb 2014 | Published: 18 Dec 2013

IBM

Cutting the Cost of Application Security
sponsored by Imperva
WHITE PAPER: This white paper presents a cost breakdown of a Web application firewall solution versus the potential costs of remediation after a successful Web attack. Click now to see why this solution is worth the investment.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

Imperva

How Are DDoS Attacks Evolving?
sponsored by Neustar®
WHITE PAPER: This resource highlights the top 8 changes in distributed denial of service (DDoS) attacks that most organizations aren't ready to defend against.
Posted: 05 May 2014 | Published: 05 May 2014

Neustar®

The Danger Deepens: Neustar Annual DDoS Attacks and Impact Report
sponsored by Neustar®
WHITE PAPER: This resource analyzes survey results regarding distributed denial of service (DDoS) attacks to see how they've evolved into an even great threat. Click through to learn how you should prepare.
Posted: 02 May 2014 | Published: 02 May 2014

Neustar®

Financial Institutions, Merchants, and the Race Against Cyberthreats
sponsored by RSA, The Security Division of EMC
WHITE PAPER: In this white paper, learn about the 4 top forms of cybercrime. Click through to reveal 6 key recommendations to best protect your organization from security breaches.
Posted: 02 Apr 2014 | Published: 31 Oct 2013

RSA, The Security Division of EMC
1 - 25 of 69 Matches Previous Page    1 2 3    Next Page
 
DENIAL OF SERVICE ATTACKS DEFINITION (continued): …  by exploiting a vulnerability in one computer system and making it the DDoS master. It is from the master system that the intruder identifies and communicates with other systems that can be compromised. The intruder loads cracking tools available on the Internet on multiple -- sometimes thousands of -- compromised systems. With a single command, the intruder instructs the controlled machines to launch one of many flood attacks against a specified target. The inundation of packets to the target causes a denial of service. While the press tends to focus on the target of DDoS attacks as the victim, … 
Denial of Service Attacks definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement