Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Denial of Service (DoS)

Developing and Monitoring Smart Environments for Intelligent Cities
An attack shutting down running of a service or network in order to render it inaccessible to its users (whether human person or a processing device).
Published in Chapter:
Internet of Things Application for Intelligent Cities: Security Risk Assessment Challenges
Wissam Abbass (INPT, Rabat, Morocco), Amine Baina (INPT, Rabat, Morocco), and Mostafa Bellafkih (INPT, Rabat, Morocco)
DOI: 10.4018/978-1-7998-5062-5.ch010
Abstract
The rapid growth of the world's population is placing a huge strain on the existing infrastructures. As a quest for accommodating this growth, interest is turned to the internet of things (IoT). In fact, the IoT is significantly improving today's quality of life by innovating the provided services and enhancing communication and interaction. Furthermore, it has also empowered real-time decision making by introducing dynamic services for innovative traffic handling, energy-efficient infrastructure saving, and public safety ensuring. However, IoT applications for smart cities is still a major issue as it lacks assuring privacy and security within provided services. In this chapter, the authors pinpoint IoT's security risk assessment challenges and examine its critical influence on smart cities. Additionally, they highlight the key aspects characterizing a smart city which also represent the critical assets requiring security risk assessment. Moreover, they discuss the resulting issues and their related countermeasures.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Digital Threats and Attacks on the Philippine Alternative Press: Range, Responses, and Remedies
A form of digital attack that seeks to overwhelm a website, rendering it inaccessible, using one computer and one internet connection.
Full Text Chapter Download: US $37.50 Add to Cart
Detection and Prevention of Fraud in the Digital Era
DoS attacks are cyber crimes where the perpetrator’s goal is to make a computer or other types of electronic devices unavailable to its users. In DoS attacks, a computer network is often overloaded with massive amounts of data in a very short time to make the servers unable to hold up the data that is being transmitted. Distributed denial of service (DDoS) attacks which often make use of botnets that can be remotely controlled are even more threatening to information systems. This helps a perpetrator to attack multiple networks and areas simultaneously. DoS and DDoS attacks can do a hefty amount of financial loss and damage the reputation of a business as people might think that the business is incapable of preventing DoS and DDoS attacks (McQuade, 2009).
Full Text Chapter Download: US $37.50 Add to Cart
A Survey of Attack Mechanisms on Infrastructure-Mode 802.11 Wireless Networks and Their Detection
A type of attack, which makes the network resources unavailable to its legitimate users.
Full Text Chapter Download: US $37.50 Add to Cart
A Study on Supervised Machine Learning Technique to Detect Anomalies in Networks
It is a kind of cyber-attack in which the adversary interrupts the services of the network.
Full Text Chapter Download: US $37.50 Add to Cart
Detecting Intrusions in Cyber-Physical Systems of Smart Cities: Challenges and Directions
A class of attack in which targeted network or system disconnects and quits from the intended mode of operation. It is one of the most dangerous attacks capable of taking down any type of network that is of any size.
Full Text Chapter Download: US $37.50 Add to Cart
Mobile Ad Hoc Network Security Vulnerabilities
Is an attempt to make a computer resource unavailable to its intended users. Typically, the targets are high-profile Web servers where the attack is aiming to cause the hosted Web pages to be unavailable on the Internet. It is a computer crime that violates the Internet proper use policy as indicated by the Internet Architecture Board (IAB).
Full Text Chapter Download: US $37.50 Add to Cart
Artificial Intelligence-Based Solutions for Cyber Security Problems
A DoS (denial of service) attack is a targeted attack, preventing the system from providing service and preventing users from accessing the system. Every system has a volume of network traffic it can handle. When these resources of the system are overloaded by the attackers, the system services slow down, and even the services provided by the system collapse completely as a result of these attacks.
Full Text Chapter Download: US $37.50 Add to Cart
Cyber Security Competency Model Based on Learning Theories and Learning Continuum Hierarchy
This happens when hackers flood a server with useless traffic to inundate and overwhelm the network, often degrading the server’s performance and causing it to shut down with the intent of damaging the organization’s reputation and customer relationships.
Full Text Chapter Download: US $37.50 Add to Cart
Distributed Denial of Service Attacks in Networks
is an attempt by attackers to prevent access to resources by legitimate users for which they have authorisation
Full Text Chapter Download: US $37.50 Add to Cart
Vulnerability Analysis and Defenses in Wireless Networks
Denial of service are attacks to prevent legitimate users from receiving services from the service provider.
Full Text Chapter Download: US $37.50 Add to Cart
Privacy and Security in Wireless Devices for the Internet of Things
In this method, the attacker sends unnecessary garbage requests to the server and the server gets down because of garbage requests. When an authorized user wants to access and use the server using the internet of things then the server denies the user's request. This process is called denial of service.
Full Text Chapter Download: US $37.50 Add to Cart
Employer Branding and Internet Security
an attempt to make a machine or network resource unavailable to its intended user.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR