In its origins, denial of service or DoS was used when some internet services were temporarily unavailable in an IT system, such as a server. This occurs when the corresponding servers are overloaded, for example, by an excessive number of requests from users. Internet services include websites, email services, or chat functions..
In a DoS attack, the attacker causes this? Denial of service? deliberately. For this,? Bombard? the network connections of the computer system responsible for exchanging external data with a multitude of requests, in order to overload them . If the number of requests exceeds the capacity of the system, the system slows down or completely stops, so that websites, email functions or online stores are no longer accessible .
A DoS attack can be compared to a situation in a real store where hundreds of people walk in and distract sales people with tricky questions, lock up resources, and make no purchases. Staff are overloaded until they cannot serve anyone else and actual customers cannot or cannot be served in the store.
Pure DoS attacks are, in principle, relatively easy to carry out , especially since they do not require penetrating the security measures of a computer system. It is even possible to carry out this illegal attack on a relatively small budget and without technical knowledge. Cybercriminals willing to carry out these types of attacks can be found for a few hundred euros on the darknet . If companies and organizations are not prepared for DoS attacks, they are exposed to enormous damage with minimal effort from the bad guys..