DoS Attacks

DoS Attacks, or Denial of Service Attacks, involve making a website or server unresponsive and inaccessible. This can be accomplished through flooding a website with so much traffic that it can no longer respond to queries or by using bugs in the system's security to "destabilize" it. A distributed denial of service attack (DDoS Attack) is one form of DoS attack that is particularly dangerous and has receive a lot of attention in the last few years.

Public Perception
The public perception of DoS attacks is largely negative. DoS attacks affect not only the website or server that is taken down but also all of the user or consumer activity on the site.

Outcome
The outcome of DoS attacks is that websites are unavailable to users which may hurt the site's credibility and/or financial viability.

Historical Use
DoS attacks are used to take sites or servers offline or to make them otherwise inaccessible to users. Reasons for DoS attacks include protests via hacktivism and criminal intent. There are multiple methods that can be used to perpetrate a DoS attack. Some examples are:
 * Teardrop Attack: in this attack, the attacker sends "IP fragment packets that are difficult to reassemble." Failure to properly reassemble the fragments may cause errors to occur.


 * Ping of Death or Long ICMP: this attack causes system failure by sending a "an IP packet larger than...allowed by the IP protocol." Fixes for this attack were made readily available in 1997.


 * Smurf Attack: this attack works by sending ping request packets in mass while using a forged IP address.


 * Ping of Flood: this attack executed by "overwhelming the victim's network with ICMP Echo Request (ping) packets."


 * SYN Flood: Syn floods overload servers by repeatedly asking to join the network and then never accepting the request. Legitimate users are the blocked from connecting.


 * Mail Bomb: this attack is aimed at disrupting mail servers. This attack occurs when a massive amount of emails are sent that have large attachments.


 * DDoS Attack: this attack involves simultaneous flooding a website or server with traffic originating from multiple sources. See the DDoS Attacks page for more information.

ICANN Policy

 * ICANN has no policy that specifically addresses DoS attacks. However, ICANN does address DDoS attacks in blog posts and in a Security and Stability Advisory Committee (SSAC) advisory. ICANN's blog discusses the issues of how to respond to and report a DDoS attack. If a site is under attack, the 2013 post suggests that the registrant contacts the hosting provider and internet service provider (ISP). If the attack was proceeded by a threat or a sum of money was demanded to stop the attack, the registrant should contact law enforcement.
 * Read ICANN's blog post on Reporting DDoS Attacks.

Legislation

 * Computer Fraud and Abuse Act (CFAA): This act, last amended in 2008, prohibits damage to another person's computer and the unauthorized use of another person's computer. Harm or damage defined under the CFAA is "any impairment to the integrity or availability of data, a program, a system, or information." Committing a DoS Attack often falls under these requirements, separate from any other criminal threats or demands that may have occurred.  In relation specifically to DDoS attacks, if the hacker used a botnet to perpetrate the attack, he or she could be charged under CFAA in addition to facing civil suits. DDoS attackers can also face jail time.


 * Additionally, many internet service providers (ISPs) and Internet-based companies have terms in their user agreements that directly or indirectly prohibit DoS attacks.

DNS Award
Awardees do not engage in DoS attacks and actively guard against them.

Additional Resources

 * View the SSAC's Report on DDoS Attacks

Related Pages

 * DDoS Attacks