What is MFA?
Multi-factor authentication (MFA) is a security method that requires users to prove their identity using two or more distinct factors before accessing …
In a denial of service attack, a malicious actor disrupts the normal functioning of a network, server or service by overwhelming it with illegitimate requests. These actors may also exploit vulnerabilities that exhaust the target’s resources.
The main objective of a DoS attack is to render a device or service unavailable to legitimate users. To do this, the target of the attack is flooded with requests until normal traffic cannot be processed.
Denial of service attacks cause a loss of availability and/or function and cost businesses time and money to rectify while services are offline. Common services that tend to be affected include websites, email and online banking.
DoS attacks have become one of the most pervasive cyber attack types because of their effectiveness and the ease with which they can be orchestrated.
Increasingly, such attacks have been associated with geopolitical events. In Q4 2023, for example, malicious traffic to Taiwan rose by 3,370% with Palestinian websites also experiencing an increase of 1,126%.
Standard denial of service attacks are typically initiated by a single computer.
However, in a distributed denial of service (DDoS) attack, the attacker employs a network of devices infected with malware. Each device is called a bot, with clusters of bots known as botnets.
When a DDoS attack takes place, each bot in the network submits requests to the IP address of the target. This generates an enormous volume of traffic that quickly overwhelms the target, and the attack itself is also harder to defend since each bot has a different IP address.
DoS and DDoS attacks can be broadly categorised into three different categories.
Protocol attacks exploit vulnerabilities in network protocols that deplete the target’s resources and make it unable to process legitimate requests. These attacks consume the resources of services, firewalls and load balancers.
Two types of protocol attacks include SYN floods and the Ping of Death (POD) attack, where attackers send oversized packets that cause the target system to crash or freeze.
Volume-based attacks aim to consume the target’s bandwidth and oversaturate server capacity to the point where it crashes. For these attacks to be successful, the attacker must have more bandwidth than the target.
Two common types of volume-based attacks include ICMP floods and UDP floods. Both are relatively simple to execute and are difficult to detect since they mimic authentic network traffic.
Application layer attacks exploit the topmost layer of the Open Systems Interconnection (OSI) model – a framework that divides network communications functions into seven discrete layers.
The application layer is the only layer where direct interaction between users and network services occurs, with software (such as web browsers) and email platforms dependent on it to initiate communication.
Unlike other DoS attack types, application layer attacks are more nuanced and exploit specific vulnerabilities within an application itself.
Common types include HTTP floods and slow loris attacks, where connections are sent to a web server and held open as long as possible to prevent the server from handling legitimate user requests.
There are various measures businesses can implement to protect themselves against denial-of-service attacks:
Multi-factor authentication (MFA) is a security method that requires users to prove their identity using two or more distinct factors before accessing …
Imposter scams are a type of fraud where scammers pretend to be trusted individuals, companies, or government agencies to deceive victims into …
Accounts payable fraud is a deceptive practice that exploits vulnerabilities in a company’s payment processes. It occurs when individuals—whether employees, vendors or …
Eftsure provides continuous control monitoring to protect your eft payments. Our multi-factor verification approach protects your organisation from financial loss due to cybercrime, fraud and error.