What Exactly Is A DDoS Attack?

A distributed denial-of-service (DDoS) attack involves a large number of computers that have been hijacked and networked into a botnet.


This collection of compromised systems then attack a single website, grinding it to a halt, and thereby denying service to all those internet surfers who wish to visit said website.

In essence, a DDoS attack will flood the target system’s server with information and requests which will eventually cause it to shut down and, therefore, deny the normal service to legitimate users.

The person, or syndicate, behind a DDoS attack will use a botnet, comprising of one vulnerable computer that will act as the DDoS master and, potentially, millions of other hijacked machines which will act as the master’s slaves.

The controller of the botnet can then issue a single command through the master, directing all the slaved machines in the network to flood the target system many times over and for as long as they feel is necessary to bring the object of their attention to its knees.

This perpetual bombardment of packets of data will eventually lead to a complete denial of service.

About Lee Munson

Lee's non-technical background allows him to write about internet security in a clear way that is understandable to both IT professionals and people just like you who need simple answers to your security questions.


  1. Interesting read always wondered what a dos attack was,


  1. […] compromised computer.(If you don’t already know what a Trojan is, then check out this post : What Exactly Is A Trojan?)The new Trojan has an appropriate name – Trojan.KillFiles.904 and has been confirmed in the […]

  2. […] of the most worrisome attacks for web site owners is probably one of the most simple to pull off. The attack is called a DDOS.The letters DDOS stand for Distributed Denial of Service attack. This attack means that someone is […]

  3. […] it could also be used to launch DDoS attacks to targeted networks, computers or […]

  4. […] vs DDoS – What Is The Difference?What Exactly Is A DDoS Attack?Money For Nothing And Your DDoS For FreeHow DDOS Attacks Are Being Used To Hold A Company […]

  5. […] few days ago I explained what a Trojan is but did you know that there are 5 6 distinct types of this […]

  6. […] AttackDoS vs DDoS – What Is The Difference?Koobface Virus Migrates From Facebook To TwitterWhat Exactly Is A DDoS Attack?Money For Nothing And Your DDoS For FreeTwitter Limits Malware LinksHow DDOS Attacks Are Being Used […]

  7. […] will see nothing wrong, but your system will be used for criminal activities such as DDOS attacks on other web sites and sending […]

  8. […] has the look of a DDOS effort but some of the tactics being used do not mirror such an […]

  9. […] 2 weeks after infecting a machine the Code Red virus was programmed to launch a DDoS attack on certain websites which included such illustrious targets as the server of the White […]

  10. […] vs DDoS – What Is The Difference?Money For Nothing And Your DDoS For FreeWhat Exactly Is A DDoS Attack?Facebook And Twitter Knocked Out By DDOS AttackWhat Will The Top Security Targets Be In 2010?Are You […]

Speak Your Mind