Denial of Service
Contents
- 1 Definitions
- 1.1 European Definitions
- 1.2 Other International Definitions
- 1.3 National Definitions
- 1.3.1 Australia
- 1.3.2 Bermuda
- 1.3.3 Burkina-Faso
- 1.3.4 Cameroon (Cameroun)
- 1.3.5 Canada
- 1.3.6 Czech Republic
- 1.3.7 Eswatini
- 1.3.8 France
- 1.3.9 Germany
- 1.3.10 Hong Kong
- 1.3.11 Jamaica
- 1.3.12 Kazakhstan
- 1.3.13 Kosovo
- 1.3.14 Kuwait
- 1.3.15 Lebanon
- 1.3.16 Liberia
- 1.3.17 Netherlands
- 1.3.18 New Zealand
- 1.3.19 Philippines
- 1.3.20 Senegal
- 1.3.21 Singapore
- 1.3.22 Togo
- 1.3.23 Tunisia
- 1.3.24 United Kingdom
- 1.3.25 United States
- 1.4 Regional Definitions
- 1.5 Dictionary
- 2 See also
- 3 Notes
- 4 References
Definitions
European Definitions
ECA
[BG] Разпределена атака тип „отказ от обслужване“ (DDoS): Кибератака, която пречи на легитимните потребители да получат достъп до онлайн услуга или ресурс, като я натоварват с повече заявки, отколкото може да поеме.
[CS] Distribuované odepření služby (DDoS, Distributed Denial of Service): Kybernetický útok zabraňující oprávněným uživatelům v přístupu k on-line službě nebo zdroji tím, že je zahlcuje větším množstvím požadavků, než mohou zvládnout.
[DE] Distributed Denial of Service (DDoS): Cyberangriff, der die rechtmäßigen Nutzer am Zugang zu Online-Diensten oder -Ressourcen hindert, indem diese mit Anfragen überlastet werden.
[DK] Distribueret Denial of Service (DDoS): Et cyberangreb, der forhindrer legitime brugere i at få adgang til en onlinetjeneste eller -ressource ved at oversvømme den med flere anmodninger, end den kan klare.
[ES] Denegación de servicio distribuido (DDoS): Ciberataque para impedir que los usuarios legítimos accedan a servicios o recursos en línea inundándolos de más solicitudes de las que pueden gestionar.
[NE] Distributed Denial of Service (DDoS): Een cyberaanval die het legitieme gebruikers onmogelijk maakt toegang te krijgen tot een onlinedienst of -bron door deze dienst of bron te overspoelen met meer verzoeken dan deze aankan.
Other International Definitions
National Definitions
Australia
These attacks often flood targeted systems with requests until they are unable to respond.
Bermuda
Burkina-Faso
La méthode la plus classique consiste à faire crouler le serveur sous une masse de requêtes généralement mal formées pour entraîner une réponse anormale et paralysante. Une attaque distribuée venant de plusieurs sources est appelée DDoS.
Examples of a remote DoS are SYS-a. PING-flooding or E-mail bombing (DDoS: TFN, Trinity, etc.) However, the availability also can be affected by local actions (destruction, disruption of power supply, etc.).
Cameroon (Cameroun)
Canada
Distributed Denial-of-Service attack: An attack in which multiple compromised systems are used to attack a single target. The flood of incoming messages to the target system forces it to shut down and denies service to legitimate users. [7]
Attaque par déni de service: L’attaque par déni de service (DoS pour Denial of Service) consiste en une activité visant à rendre un service inutilisable ou à ralentir l’exploitation et les fonctions d’un système donné.
Attaque par déni de service distribué: Attaque par laquelle une multitude de systèmes compromis visent une même cible. Le flux de messages envoyés est tel qu’il provoque une panne du système ciblé et l’interruption des services offerts aux utilisateurs légitimes. [8]
Czech Republic
Distributed denial of service (DDoS): Distributed denial of service is the technique of attack by many coordinated attackers on the internet services or pages resulting in flooding by requests or breakdown or unfunctionality or unavailability of the system for other users. [9]
Denial of service (DoS): Denial of service is the technique of attack by many coordinated attackers on the internet services or pages resulting in flooding by requests or breakdown or unfunctionality or unavailability of the system for other users. [9]
Eswatini
France
Germany
Distributed Denial of Service–Angriff: Das Grundprinzip beim Distributed Denial of Service–Angriff (DDoS) ist gleich wie bei einem Denial of Service, allerdings wird die Intensität der störenden Anfragen dadurch drastisch erhöht, dass diese von einer Vielzahl von Rechnern generiert werden. [12]
Hong Kong
Denial-of-Service: An attacker attempts to prevent legitimate users from accessing information or services. Examples of such attacks are SYN flood, Ping O death, packet flooding and Ping flooding. [13]
Distributed Denial of Service (DDoS): An attack using multiple computers to launch denial-of-service (DoS) attacks at the same time against a targeted system. [14]
Jamaica
Kazakhstan
DDoS - (от англ. Distributed Denial-of-Service) – распределенная атака типа отказ в обслуживании, которая являет собой одну из самых распространенных и опасных сетевых атак. В результате атаки нарушается или полностью блокируется обслуживание законных пользователей, сетей, систем и иных ресурсов.
DDoS - distributed denial-of-service attack is an attempt to make a machine or network resource unavailable to its intended users. A DoS attack generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. As clarification, distributed denial-of-service attacks are sent by two or more people, or bots, and denial-of-service attacks are sent by one person or system. [16]
Kosovo
Kuwait
Lebanon
Distibuted Denial of Service (DDoS): A distributed denial-of-service (DDoS) is a DoS attack from multiple sources. [19]
Liberia
Netherlands
New Zealand
Philippines
Senegal
Singapore
Togo
Déni de service distribué: attaque simultanée des ressources du système d'information ou du réseau de communications électroniques, afin de les saturer et amplifier les effets d'entrave; [28]
Tunisia
The most common method is to cram the server under a mass of queries usually poorly formed to cause an abnormal response and paralyzing. A distributed attack from multiple sources is called DDoS.
United Kingdom
United States
DHS
Financial Stability Board
NIST
Regional Definitions
Isle of Man
Dictionary
See also
Notes
References
- Jump up ↑ European Court of Auditors, Challenges to effective EU cybersecurity policy, Briefing Paper, March 2019
- Jump up ↑ Protective Security Policy Framework - Glossary Oct 2017
- Jump up ↑ on-line glossary Stay Safe On-line
- Jump up ↑ National Cyber Security Strategy 2018-2022
- ↑ Jump up to: 5.0 5.1 CIRT-BF Glossary
- Jump up ↑ LOI N°2010/012 DU 21 DECEMBRE 2010 RELATIVE A LA CYBERSECURITE ET LA CYBERCRIMINALITE AU CAMEROUN
- Jump up ↑ Glossary - Canadian Centre for Cyber Security
- Jump up ↑ Glossaire - Centre Canadien pour la Cybersécurité
- ↑ Jump up to: 9.0 9.1 9.2 9.3 [1]
- Jump up ↑ ESWATINI NATIONAL CYBERSECURITY STRATEGY 2020 - 2025 (2020)
- Jump up ↑ Revue stratégique de cyberdéfense 12 février 2018
- Jump up ↑ Bericht des Rechnungshofes: Management der IT–Sicherheit in der ¬Verwaltung ausgewählter Bundesministerien
- Jump up ↑ Information Security Glossary
- Jump up ↑ Information Security Glossary
- Jump up ↑ Jamaica's National Cyber Security Strategy
- Jump up ↑ CERT.Gov.KZ Glossary
- Jump up ↑ National Cyber Security Strategy and Action Plan 2023 – 2026 (2023)
- Jump up ↑ Glossary Communication and Information Technology Regulatory
- Jump up ↑ Lebanon Cyber Security Strategy v2
- Jump up ↑ Government of Liberia’s Policy for the Telecommunications and Information Communications Technology (ICT) sectors
- ↑ Jump up to: 21.0 21.1 Cyber Security Beeld Nederland 2018
- Jump up ↑ Handreiking Cybercrime (2012)
- Jump up ↑ New Zealand’s Cyber Security Strategy (2019)
- Jump up ↑ NHS Cyber security glossary
- Jump up ↑ NHS Cyber security glossary
- Jump up ↑ STRATÉGIE NATIONALE DE CYBERSÉCURITÉ DU SÉNÉGAL (SNC2022)
- Jump up ↑ Singapore Cyber Landscape 2017
- Jump up ↑ Loi n°2018-026 sur la Cybersécurité et la lutte contre la cybercrinminalité (2022)
- Jump up ↑ ANSI Glossary
- Jump up ↑ Secure by Design: Improving the cyber security of consumer Internet of Things Report (2018)
- ↑ Jump up to: 31.0 31.1 DHS/NICSS Glossary
- Jump up ↑ Financial Stability Board, Cyber Lexicon (Nov. 12, 2018)
- Jump up ↑ Financial Stability Board, Cyber Lexicon (Nov. 12, 2018)
- ↑ Jump up to: 34.0 34.1 34.2 NIST Glossary
- Jump up ↑ Isle of Man National Cyber Security Strategy (2022-2027)
- Jump up ↑ Cybersecurity Woordenboek 2021