Denial of Service

From CIPedia
Jump to: navigation, search


National Definitions


Denial of service: Deliberate compromise of the availability of IT systems. [1]

Denial-of-Service (DoS): An attack that is used to stop an online system (such as a website) from being available to legitimate users. [2]
These attacks often flood targeted systems with requests until they are unable to respond.


Déni de service (Deny of service ou Denial of Service ou DoS): Ensemble de techniques d’attaques, venant d’une même source, ayant pour but d’interrompre la fonction d’un serveur et de le rendre indisponible. [3]
La méthode la plus classique consiste à faire crouler le serveur sous une masse de requêtes généralement mal formées pour entraîner une réponse anormale et paralysante. Une attaque distribuée venant de plusieurs sources est appelée DDoS.

DoS, DDoS, Sabotage: By this kind of an attack a system is bombarded with so many packets that the operations are delayed or the system crashes. [3]
Examples of a remote DoS are SYS-a. PING-flooding or E-mail bombing (DDoS: TFN, Trinity, etc.) However, the availability also can be affected by local actions (destruction, disruption of power supply, etc.).


Denial of Service attack: Any activity that makes a service unavailable for use by legitimate users, or that delays system operations and functions.

Distributed Denial-of-Service attack: An attack in which multiple compromised systems are used to attack a single target. The flood of incoming messages to the target system forces it to shut down and denies service to legitimate users. [4]

Attaque par déni de service: L’attaque par déni de service (DoS pour Denial of Service) consiste en une activité visant à rendre un service inutilisable ou à ralentir l’exploitation et les fonctions d’un système donné.
Attaque par déni de service distribué: Attaque par laquelle une multitude de systèmes compromis visent une même cible. Le flux de messages envoyés est tel qu’il provoque une panne du système ciblé et l’interruption des services offerts aux utilisateurs légitimes. [5]


Déni de service (DoS): attaque informatique ayant pour but de rendre indisponible un service en submergent ses ressources informatiques de traffic inutile. Lorsque l'attaque est conduite à l'aide de plusieurs source de traffic malveillant, on parle de déni de service distribué (DDoS). [6]

Hong Kong

攻擊者嘗試阻止用家使用網上資訊或服務。這類攻擊的例子計 有大量的 SYN,「致命小包」,小包氾濫及 Ping 氾濫等。 拒絕服務 <br/
Denial-of-Service: An attacker attempts to prevent legitimate users from accessing information or services. Examples of such attacks are SYN flood, Ping O death, packet flooding and Ping flooding. [7]

利用多台電腦向同一目標系統同時發動拒絕服務攻擊。 分布式拒絕服務攻擊

Distributed Denial of Service (DDoS): An attack using multiple computers to launch denial-of-service (DoS) attacks at the same time against a targeted system. [8]


Denial of Service – is a malicious attempt to make a server or a network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the Internet usually by flooding the target resource with external communication requests. [9]


DDoS - шабуыл (ағылш. Distributed Denial-of-Service) – кең таралған және қауіпті желілік шабуылдардың бірі болып табылатын қызмет көрсетуден бас тарту түріндегі үлестірілген шабуыл. Шабуыл нәтижесінде заңды пайдаланушыларға, желілерге, жүйелер мен өзге де ресурстарға қызмет көрсету бұзылады немесе толық істен шығарылады.

DDoS - (от англ. Distributed Denial-of-Service) – распределенная атака типа отказ в обслуживании, которая являет собой одну из самых распространенных и опасных сетевых атак. В результате атаки нарушается или полностью блокируется обслуживание законных пользователей, сетей, систем и иных ресурсов.

DDoS - distributed denial-of-service attack is an attempt to make a machine or network resource unavailable to its intended users. A DoS attack generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. As clarification, distributed denial-of-service attacks are sent by two or more people, or bots, and denial-of-service attacks are sent by one person or system. [10]


Denial of Service: the prevention of authorized access to resources or the delaying of time-critical operations. [11]


Denial-of-service attack: Flooding the networks or servers of individuals or organizations with false data requests so they are unable to respond to requests from legitimate users. [12]


Denial of Service is de benaming voor een type aanval die een bepaalde dienst (bijvoorbeeld een website) niet beschikbaar maakt voor de gebruikelijke afnemers. Bij websites wordt meestal een DDoS-aanval uitgevoerd. [13]

Distributed Denial of Service (DDoS) is een vorm van DoS waarbij een bepaalde dienst (bijvoorbeeld een website) niet beschikbaar wordt gemaakt door deze te bestoken met veel netwerkverkeer vanuit een groot aantal verschillende bronnen. [13]

(Distributed) Denial of Service (DoS): Een actie waarbij wordt geprobeerd een computer, een systeem of telecommunicatienetwerk zo te belasten of te manipuleren, dat deze wordt uitgeschakeld en niet meer beschikbaar is voor (bevoegde) gebruikers. DoS houdt in dat een computer continu ‘aangevallen’ wordt door bijvoorbeeld e-mail of ander netwerkverkeer. [14]

New Zealand

Distributed Denial of Service Attack (DDoS): A cyber attack that stops users from accessing a service or resource, by overloading that service with requests. [15]


Denial of Service (DOS): Interruption in an authorised user's access to a computer network, typically with malicious intent. A DOS attack is a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet or the organisation’s Intranet. [16]

Distributed Denial of Service (DDOS): Denial of Service attacks are launched from multiple connected devices that are distributed across the Internet or the organisation’s Intranet. [17]


Dénis de services distribués (« DDoS »: un type d’attaque rendant un service inaccessible aux bénéficiaires habituels du service. Il s’agit d’ne technique perturbant fortement le fonctionnement normal du système par un grand nombre de requêtes. [18]


Denial of Service (DoS) / Distributed DoS (DDoS): Where an attacker attempts to prevent legitimate users from accessing information or services online. The most common and obvious type of DoS attack occurs when an attacker "floods" a network with information. In a distributed DoS attack, an attacker takes unauthorised control of multiple computers, which may be harnessed as a botnet, to launch a DoS attack. [19]


Denial of Service (Deny of Service or DoS): A set of attacking techniques, coming from the same source, intended to interrupt the function of a server and make it unavailable. [20]
The most common method is to cram the server under a mass of queries usually poorly formed to cause an abnormal response and paralyzing. A distributed attack from multiple sources is called DDoS.

United Kingdom

Distributed denial-of-service attack: Where many networked devices try to communicate with another at the same time, causing the targeted device to be significantly slower to respond or cease to function. [21]

United States

Denial of Service is an attack that prevents or impairs the authorized use of information system resources or services. [22]

Distributed denial of service is a Denial of Service technique that uses numerous systems to perform the attack simultaneously. [22]

Denial of Service: Actions that prevent the system from functioning in accordance with its intended purpose (from: NIST SP 800-24) [23]

Denial of Service: The prevention of authorized access to resources or the delaying of time-critical operations. (Time-critical may be milliseconds or it may be hours, depending upon the service provided) (from: NIST SP 800-27 Rev A) [23]

Denial of Service: The prevention of authorized access to resources or the delaying of time-critical operations. (from: NIST SP 800-33) [23]

See also


  1. Protective Security Policy Framework - Glossary Oct 2017
  2. on-line glossary Stay Safe On-line
  3. 3.0 3.1 CIRT-BF Glossary
  4. Glossary - Canadian Centre for Cyber Security
  5. Glossaire - Centre Canadien pour la Cybersécurité
  6. Revue stratégique de cyberdéfense 12 février 2018
  7. Information Security Glossary
  8. Information Security Glossary
  9. Jamaica's National Cyber Security Strategy
  10. CERT.Gov.KZ Glossary
  11. Glossary Communication and Information Technology Regulatory
  12. Government of Liberia’s Policy for the Telecommunications and Information Communications Technology (ICT) sectors
  13. 13.0 13.1 Cyber Security Beeld Nederland 2018
  14. Handreiking Cybercrime (2012)
  15. New Zealand’s Cyber Security Strategy (2019)
  16. NHS Cyber security glossary
  17. NHS Cyber security glossary
  19. Singapore Cyber Landscape 2017
  20. ANSI Glossary
  21. Secure by Design: Improving the cyber security of consumer Internet of Things Report (2018)
  22. 22.0 22.1 DHS/NICSS Glossary
  23. 23.0 23.1 23.2 NIST Glossary