Find Laws Find Lawyers Free Legal Forms USA State Laws
Home » Find Laws » Criminal Laws » Computer Crime » Associated Crimes » Denial Of Service Attacks » Foms of Denial of Service Attack

Foms of Denial of Service Attack

Denial Of Service Attack Usage

Many see the usage of a Denial of Service Attack (more commonly known as "DoS Attack) against someone or against an entity as a form of cyberterrorism and as a prime example of computer crime cases. It is a hostile attack, and in all computer crime cases the attacks use computers as well as the Internet in order to send an aggressive message. A DoS Attack is commonly used to slow down computer systems as well as the Internet and interrupt or destroy communication between networks, which causes problems for businesses as well as for personal computer users. Many computer crime cases are considered to be Federal offenses punishable by law. There are many different forms of a Denial of Service Attack which include teardrop attacks, ICMP Flood Attacks, peer-to-peer attacks, permanent denial of services attacks, nukes, distributed attacks, degradation of services attacks, blind denial of services, denial of service level ll, unintentional denial of services, and application level floods. The most common form of attack is the ICMP flood attack. This is performed when the attacker decides to "flood" an overwhelming amount of information at one time to one network causing it to stall and time out. A Denial of Service Attack is normally carried out as a personal vendetta against a person or business for personal or financial gain, or just to cause inconvenience to another party. An example of just one of many computer crime cases took place in June 2009 when the "Pirate Bay" website suffered a Denial of Service Attack. No one could get onto the site and many felt that it was a vicious Denial of Service Attack due to the fact that many fans believed that the website had "sold out" to an international gaming corporation. This was one of the most popular international computer crime cases. Although there is nothing that can be done to guarantee that you will not be attacked, several courses of action can be taken so that you are less likely to become a target or victim in such computer crime cases. The following steps may help to prevent falling victim to a Denial of Service Attack: install a firewall, install anti-virus software, and do not be too liberal about giving out your e-mail address or personal information over the computer (this will help reduce spam mail which can contain harmful malware).

Related Articles

Link To This Page


Find an CT Lawyer
Guide to Finding a Lawyer