0
0
Computer Networksknowledge~6 mins

DoS and DDoS attacks in Computer Networks - Full Explanation

Choose your learning style9 modes available
Introduction
Imagine trying to enter a store but finding the entrance blocked by a crowd of people who don't want to shop. This problem is similar to what happens during certain cyberattacks that make websites or online services unavailable to real users.
Explanation
Denial of Service (DoS) Attack
A DoS attack happens when one attacker floods a website or online service with so much fake traffic that it cannot handle real visitors. This overload causes the service to slow down or stop working, denying access to legitimate users.
A DoS attack uses one source to overwhelm a service and block real users.
Distributed Denial of Service (DDoS) Attack
A DDoS attack is like a DoS attack but much bigger because it comes from many computers at once. These computers are often controlled without their owners knowing, forming a network called a botnet that floods the target with traffic from many places.
A DDoS attack uses many sources simultaneously to overwhelm a service.
How These Attacks Affect Services
When a service is flooded with fake requests, it uses up its resources like bandwidth and processing power. This can slow down the service or make it crash, preventing real users from accessing it or causing delays.
Fake traffic consumes resources, causing slowdowns or crashes.
Common Methods Used in DoS and DDoS Attacks
Attackers use different techniques like sending many connection requests, exploiting weaknesses in network protocols, or overwhelming servers with large data packets. Each method aims to exhaust the target's capacity to respond.
Attackers use various techniques to overload different parts of a service.
Defending Against DoS and DDoS Attacks
To protect services, organizations use tools like firewalls, traffic filters, and special services that detect and block attack traffic. They also prepare by having extra capacity and plans to respond quickly when attacks happen.
Defense involves filtering attack traffic and preparing resources to handle overload.
Real World Analogy

Imagine a small coffee shop where one person blocks the door, not letting anyone else enter. Now imagine a crowd of people from many directions all trying to get in at once, making it impossible for real customers to get served.

Denial of Service (DoS) Attack → One person blocking the coffee shop door, stopping others from entering
Distributed Denial of Service (DDoS) Attack → A large crowd from many directions blocking the coffee shop entrance
How These Attacks Affect Services → The coffee shop running out of space and staff to serve real customers
Common Methods Used in DoS and DDoS Attacks → Different ways the crowd tries to block the door, like pushing or standing still
Defending Against DoS and DDoS Attacks → The shop hiring security and setting up barriers to control who can enter
Diagram
Diagram
┌───────────────────────────────┐
│          Internet             │
│                               │
│  ┌───────────────┐            │
│  │ Attacker(s)   │            │
│  └──────┬────────┘            │
│         │                     │
│   ┌─────▼─────┐               │
│   │  Botnet   │               │
│   └─────┬─────┘               │
│         │                     │
│ ┌───────▼─────────┐           │
│ │ Target Website  │           │
│ │  (Server)       │           │
│ └─────────────────┘           │
└───────────────────────────────┘
This diagram shows attackers and a botnet sending traffic through the internet to overwhelm a target website server.
Key Facts
Denial of Service (DoS)An attack from a single source that floods a service to make it unavailable.
Distributed Denial of Service (DDoS)An attack from many sources simultaneously to overwhelm a service.
BotnetA network of infected computers controlled by an attacker to launch DDoS attacks.
BandwidthThe amount of data a network can handle at one time.
FirewallA security tool that filters incoming and outgoing network traffic.
Common Confusions
Believing DoS and DDoS attacks are the same because both cause service disruption.
Believing DoS and DDoS attacks are the same because both cause service disruption. DoS attacks come from one source, while DDoS attacks come from many sources working together.
Thinking only large companies are targets of these attacks.
Thinking only large companies are targets of these attacks. Any online service, big or small, can be targeted by DoS or DDoS attacks.
Summary
DoS attacks overload a service from one source, while DDoS attacks use many sources at once.
These attacks make websites or services slow or unavailable by flooding them with fake traffic.
Defenses include filtering traffic, increasing capacity, and preparing response plans.