Logo

Explaining Denial-of-Service
(DoS) Attacks

Cyberattacks aren’t always about stealing data. Sometimes, the goal is much simpler and just as damaging: take you offline.

That’s exactly what a Denial-of-Service (DoS) attack does. By overwhelming your systems or exploiting weaknesses in your applications, attackers can make your website, apps, email, VPN or other online services unavailable to genuine users-right when you need them most.

Since 2020, the surge in remote work, cloud adoption and online services has made availability a critical part of cyber security. National cyber agencies now specifically warn that even short periods of downtime can have serious consequences for small and medium businesses.

This guide explains, in clear business language:

1. What Is a Denial-of-Service (DoS) Attack?

A Denial-of-Service attack is a cyberattack that disrupts the normal operation of a system, website, application or network so that legitimate users can’t access it.

Instead of breaking in to steal data, an attacker focuses on the “A” in the CIA triad-availability:

Because these attacks are carried out over the internet, they can originate from anywhere. That makes tracing and prosecuting offenders extremely difficult. They’re widely used by:

Organisations of all sizes-from small ecommerce stores and professional services firms to large SaaS providers and government agencies-are targeted.

2. DoS vs DDoS: What’s the Difference?

You’ll often see two closely related terms:

DoS (Denial-of-Service)

DDoS (Distributed Denial-of-Service)

Denial of Service attacks Keywords made from three - Computing Australia Group

Modern attacks are overwhelmingly DDoS. Guidance from agencies like CISA classifies DDoS attacks into three broad technical categories: volumetric, protocol and application-layer attacks. Volumetric attacks try to consume bandwidth, protocol attacks exploit weaknesses in network protocols, and application-layer attacks focus on specific web applications or APIs. 

For most businesses, the effect is the same: your services are slow, unstable or completely unavailable.

3. How Do DoS Attacks Work? (In Plain English)

Any online service is constrained by three core limits:

A DoS or DDoS attack works by pushing one or more of these limits past breaking point.

The Handshake Example

When someone visits your website:

1. Their device sends a request to the server.

2. The server replies and tries to establish a connection (the “handshake”).

3. Once the handshake completes, normal browsing begins.

In a classic DoS scenario:

Multiply that behaviour across tens of thousands of requests per second and your site effectively disappears from the internet-even though it’s technically still running.

Attackers can also:

4. Flooding vs Crash Attacks

DoS and DDoS attacks broadly fall into two behavioural categories:

4.1 Flooding Attacks (Resource Exhaustion)

These are the most common. The attacker sends so much traffic or so many requests that your infrastructure simply cannot cope.

Examples include:

Attackers send a huge number of ICMP echo requests (“pings”), often with spoofed IP addresses. The target spends CPU and bandwidth processing and replying to pointless traffic.

Abuse the TCP handshake. The attacker sends large volumes of SYN packets to initiate connections but never completes them. Your server fills up with half-open connections and runs out of space for genuine users.

Attackers bombard random or specific ports with UDP or TCP packets, forcing the system to repeatedly check for listening services and respond or drop packets.

Seemingly “normal” web requests-page loads, searches, logins, API calls-are sent in large volumes, often using scripts or bots to mimic real users. Because the traffic looks legitimate, it can bypass simple network filters.

Flooding attacks focus on volume rather than finesse: overwhelm the system until it slows to a crawl or falls over.

4.2 Crash Attacks (Exploit-Based)

Crash-style DoS attacks don’t rely on huge traffic volumes. Instead, they send malformed or specially crafted data that exploits a bug or weakness to make a service fail.

For example:

These attacks exploit specific vulnerabilities in software. Regular patching and secure coding practices go a long way towards reducing this risk.

5. Types of DoS Attacks by Target

Your ability to defend against DoS attacks improves when you understand what the attacker is trying to overwhelm.

5.1 Network-Targeted DoS (Bandwidth Consumption)

Also called volumetric attacks, these aim to saturate your internet connection or edge devices:

These attacks are often mitigated before traffic reaches your network-by your ISP, cloud provider or a specialist DDoS protection service.

5.2 System-Targeted DoS (Infrastructure Resource Depletion)

Here, the attacker wants to exhaust internal server resources such as:

This might involve:

Depending on the system, outcomes range from sluggish performance and intermittent errors through to complete crashes and potential data corruption.

5.3 Application-Targeted DoS (Layer 7)

These attacks focus on your applications and business logic rather than raw bandwidth. They target:

Because the traffic can look like normal user activity (just more of it, or more cleverly arranged), application-layer attacks can slip past simple rate limits or basic network filters. OWASP highlights these as a major threat category for modern web applications.

6. The Real Business Impact of DoS and DDoS Attacks

It’s easy to think “we’re too small to be a target”-but data from government and industry consistently shows that small organisations are heavily affected by cyber incidents, including availability attacks.

Typical impacts include:

For smaller businesses, even a single serious outage can have lasting financial and reputationalv consequences.

7. How to Recognise a DoS or DDoS Attack

Early detection is half the battle. Common warning signs include:

Distinguishing an attack from a legitimate traffic surge requires baseline monitoring: you need to know what “normal” looks like before you can identify “abnormal”.

8. Preventing and Mitigating DoS Attacks: A Layered Approach

There is no single product that makes you “DDoS-proof”. Effective defence is about layers of controls, from infrastructure design through to secure coding and operational processes. OWASP’s Denial-of-Service Cheat Sheet strongly emphasises this multi-layered strategy.

8.1 Start with Resilient Hosting and Architecture

8.2 Harden Your Network Perimeter

8.3 Build More Resilient Applications

Application-layer DoS needs to be addressed at the code and design level:

OWASP resources provide detailed, developer-friendly guidance for mitigating DoS at the application level.

8.4 Keep Software and Firmware Up-to-Date

Many crash-style DoS attacks exploit known vulnerabilities in:

Practical steps:

8.5 Monitor, Alert and Log Effectively

You can’t respond to what you can’t see.

8.6 Run Regular Tests and Drills

9. What to Do If You’re Under a DoS/DDoS Attack

When an attack is underway, minutes matter. Here’s a practical high-level playbook:

1. Confirm what’s happening

2. Activate your incident response plan

3. Engage your providers

4. Tighten controls at your end

5. Prioritise critical services

6. Consider “black hole routing” as a last resort

7. Communicate clearly

8. Review and improve post-incident

CISA and other agencies provide more detailed DDoS response playbooks that your team can adapt to your environment.

10. Don’t Help Attackers: Securing Your Own Devices

Botnets used for DDoS attacks are often built from poorly secured servers, PCs, routers and IoT devices. If your environment isn’t properly secured, your systems could be:

Reduce this risk by:

Securing your environment helps protect you-and prevents your business from unintentionally participating in attacks elsewhere.

11. DoS & DDoS Readiness Checklist for Small & Medium Businesses

Use this quick checklist as a starting point during planning or audits:

12. Short FAQ: Denial-of-Service (DoS) Attacks

1. Is a DoS attack the same as my website crashing?

Not always. A DoS or DDoS attack can cause your site to crash or become unstable, but outages also happen because of:

To confirm a DoS attack, you need to look at traffic patterns, logs and resource usage, not just the fact that the site is down.

2. How long do DDoS attacks usually last?

Anything from a few minutes to several hours or even days. Some attackers run short tests, while others launch prolonged campaigns with changing techniques. DDoS-for-hire services commonly sell attacks in fixed time blocks (e.g. 15 minutes, 1 hour, 24 hours).

3. Can antivirus software stop a DoS attack?

No. Traditional antivirus helps protect individual devices from malware but doesn’t:

You need network, infrastructure and application-level controls to prevent and mitigate DoS attacks.

4. Are small businesses really targets?

Yes. Guidance from agencies like the ACSC and FTC notes that small organisations often suffer disproportionately from cyber incidents because they lack dedicated security teams, yet rely heavily on online services to operate.

We hope this article answered your question- “What are denial-of-service attacks?”. DoS attacks are becoming common and more sophisticated, especially with the increasing usage of IoT. Learning about such cyberattacks and taking the necessary precautions will keep your systems and networks safe. Do you need assistance in building a fool-proof cybersecurity strategy? Contact us or email us at cybersecurity@computingaustralia.group for ultrasafe security plans for your business.

Jargon Buster

ICMP – An Internet Control Message Protocol (ICMP) flood, also known as a Ping flood attack, is a DoS attack in which an attacker tries to bring down a targeted device with ICMP echo-requests or pings.

SYN flood – A SYN (short for synchronize) flood, also referred to as a half-open attack, is a DoS attack that floods a server with connection requests without responding to the corresponding replies.

ISP –  An internet service provider (ISP) is a company that offers internet and internet related services to individuals and other companies.

FAQ

A Denial-of-Service attack is when an attacker intentionally overloads your website, application or network so that it can’t respond to real users. Instead of breaking in to steal data, the attacker’s goal is to take you offline or make your services unbearably slow.

A DDoS (Distributed Denial-of-Service) attack uses many devices at once – often thousands of compromised computers, routers and IoT devices – to flood your systems. DDoS attacks are harder to block because the traffic comes from many different locations.

Not usually. A DoS or DDoS attack is primarily about disruption, not data theft. However, attackers sometimes use DoS as a distraction while carrying out other attacks (like phishing, account compromise or ransomware) elsewhere in your environment. That’s why it’s important to treat every serious DoS incident as a security event, not just a performance issue.

Yes, indirectly. Search engines don’t “penalise” you just for being attacked, but if your website is frequently unavailable, slow or returning errors when search engine bots try to crawl it, this can hurt user experience signals and indexing. Over time, repeated outages may lead to:

Yes. Cloud services are more scalable, but they are not immune. While major cloud providers have strong DDoS protections and massive capacity, attacks can still: