Difference between revisions of "Denial of Service"
(→Burkina-Faso) |
(→Czech Republic) |
||
(6 intermediate revisions by the same user not shown) | |||
Line 17: | Line 17: | ||
{{definition|Denial of Service attack: Any activity that makes a service unavailable for use by legitimate users, or that delays system operations and functions.<br/><br>''Distributed'' Denial-of-Service attack: An attack in which multiple compromised systems are used to attack a single target. The flood of incoming messages to the target system forces it to shut down and denies service to legitimate users. <ref>[https://www.cyber.gc.ca/en/glossary Glossary - Canadian Centre for Cyber Security]</ref><br/><br/>Attaque par déni de service: L’attaque par déni de service (DoS pour Denial of Service) consiste en une activité visant à rendre un service inutilisable ou à ralentir l’exploitation et les fonctions d’un système donné.<br/>Attaque par déni de service ''distribué'': Attaque par laquelle une multitude de systèmes compromis visent une même cible. Le flux de messages envoyés est tel qu’il provoque une panne du système ciblé et l’interruption des services offerts aux utilisateurs légitimes. <ref>[https://www.cyber.gc.ca/fr/glossaire Glossaire - Centre Canadien pour la Cybersécurité]</ref>}} | {{definition|Denial of Service attack: Any activity that makes a service unavailable for use by legitimate users, or that delays system operations and functions.<br/><br>''Distributed'' Denial-of-Service attack: An attack in which multiple compromised systems are used to attack a single target. The flood of incoming messages to the target system forces it to shut down and denies service to legitimate users. <ref>[https://www.cyber.gc.ca/en/glossary Glossary - Canadian Centre for Cyber Security]</ref><br/><br/>Attaque par déni de service: L’attaque par déni de service (DoS pour Denial of Service) consiste en une activité visant à rendre un service inutilisable ou à ralentir l’exploitation et les fonctions d’un système donné.<br/>Attaque par déni de service ''distribué'': Attaque par laquelle une multitude de systèmes compromis visent une même cible. Le flux de messages envoyés est tel qu’il provoque une panne du système ciblé et l’interruption des services offerts aux utilisateurs légitimes. <ref>[https://www.cyber.gc.ca/fr/glossaire Glossaire - Centre Canadien pour la Cybersécurité]</ref>}} | ||
<br/><br/> | <br/><br/> | ||
+ | ====[[Czech Republic]]==== | ||
+ | {{definition|Distribuované odmítnutí služby: Distribuované odmítnutí služby je technika útoku na internetové služby nebo stránky, při níž dochází k přehlcení požadavky a k pádu nebo nefunkčnosti a nedostupnosti systému pro ostatní uživatele a to útokem mnoha koordinovaných útočníků. <ref name=CZglos>[https://www.govcert.cz/download/slovnik/vykladovy_slovnik_KB_2_vydani.pdf]</ref><br/><br/>Distributed denial of service (DDoS): Distributed denial of service is the technique of attack by many coordinated attackers on the internet services or pages resulting in flooding by requests or breakdown or unfunctionality or unavailability of the system for other users. <ref name=CZglos>[https://www.govcert.cz/download/slovnik/vykladovy_slovnik_KB_2_vydani.pdf]</ref>}} | ||
+ | <br/> | ||
+ | {{definition|Odmítnutí služby: Odmítnutí služby je technika útoku na internetové služby nebo stránky, při níž dochází k přehlcení požadavky a k pádu nebo nefunkčnosti a nedostupnosti systému pro ostatní uživatele a to útokem mnoha koordinovaných útočníků. <ref name=CZglos>[https://www.govcert.cz/download/slovnik/vykladovy_slovnik_KB_2_vydani.pdf]</ref><br/><br/>Denial of service (DoS): Denial of service is the technique of attack by many coordinated attackers on the internet services or pages resulting in flooding by requests or breakdown or unfunctionality or unavailability of the system for other users. <ref name=CZglos>[https://www.govcert.cz/download/slovnik/vykladovy_slovnik_KB_2_vydani.pdf]</ref>}}<br/> | ||
==== [[France]] ==== | ==== [[France]] ==== | ||
Line 38: | Line 42: | ||
==== [[Netherlands]]==== | ==== [[Netherlands]]==== | ||
{{definition|Denial of Service is de benaming voor een type aanval die een bepaalde dienst (bijvoorbeeld een website) niet beschikbaar maakt voor de gebruikelijke afnemers. Bij websites wordt meestal een DDoS-aanval uitgevoerd. <ref name=csbn>[https://www.ncsc.nl/binaries/content/documents/ncsc-nl/actueel/cybersecuritybeeld-nederland/cybersecuritybeeld-nederland-2018/1/CSBN_2018.pdf Cyber Security Beeld Nederland 2018]</ref>}}<br/> | {{definition|Denial of Service is de benaming voor een type aanval die een bepaalde dienst (bijvoorbeeld een website) niet beschikbaar maakt voor de gebruikelijke afnemers. Bij websites wordt meestal een DDoS-aanval uitgevoerd. <ref name=csbn>[https://www.ncsc.nl/binaries/content/documents/ncsc-nl/actueel/cybersecuritybeeld-nederland/cybersecuritybeeld-nederland-2018/1/CSBN_2018.pdf Cyber Security Beeld Nederland 2018]</ref>}}<br/> | ||
− | {{definition|''Distributed'' Denial of Service (DDoS) is een vorm van [[Denial of Service|DoS]] waarbij een bepaalde dienst (bijvoorbeeld een website) niet beschikbaar wordt gemaakt door deze te bestoken met veel netwerkverkeer vanuit een groot aantal verschillende bronnen. <ref name=csbn>[https://www.ncsc.nl/binaries/content/documents/ncsc-nl/actueel/cybersecuritybeeld-nederland/cybersecuritybeeld-nederland-2018/1/CSBN_2018.pdf Cyber Security Beeld Nederland 2018]</ref>}}<br/><br/> | + | {{definition|''Distributed'' Denial of Service (DDoS) is een vorm van [[Denial of Service|DoS]] waarbij een bepaalde dienst (bijvoorbeeld een website) niet beschikbaar wordt gemaakt door deze te bestoken met veel netwerkverkeer vanuit een groot aantal verschillende bronnen. <ref name=csbn>[https://www.ncsc.nl/binaries/content/documents/ncsc-nl/actueel/cybersecuritybeeld-nederland/cybersecuritybeeld-nederland-2018/1/CSBN_2018.pdf Cyber Security Beeld Nederland 2018]</ref>}}<br/> |
+ | {{definition|(Distributed) Denial of Service (DoS): Een actie waarbij wordt geprobeerd een computer, een systeem of telecommunicatienetwerk zo te belasten of te manipuleren, dat deze wordt uitgeschakeld en niet meer beschikbaar is voor (bevoegde) gebruikers. DoS houdt in dat een computer continu ‘aangevallen’ wordt door bijvoorbeeld e-mail of ander netwerkverkeer. <ref>[https://kennisopenbaarbestuur.nl/media/53867/handreiking-cybercrime.pdf Handreiking Cybercrime (2012)]</ref>}}<br/><br/> | ||
==== [[New Zealand]] ==== | ==== [[New Zealand]] ==== | ||
Line 55: | Line 60: | ||
{{definition|Denial of Service (Deny of Service or DoS): A set of attacking techniques, coming from the same source, intended to interrupt the function of a server and make it unavailable. <ref>[https://www.ansi.tn/fr/pages/documentation/glossaire.html ANSI Glossary]</ref>}}The most common method is to cram the server under a mass of queries usually poorly formed to cause an abnormal response and paralyzing. A distributed attack from multiple sources is called DDoS.<br/><br/> | {{definition|Denial of Service (Deny of Service or DoS): A set of attacking techniques, coming from the same source, intended to interrupt the function of a server and make it unavailable. <ref>[https://www.ansi.tn/fr/pages/documentation/glossaire.html ANSI Glossary]</ref>}}The most common method is to cram the server under a mass of queries usually poorly formed to cause an abnormal response and paralyzing. A distributed attack from multiple sources is called DDoS.<br/><br/> | ||
====[[United Kingdom]]==== | ====[[United Kingdom]]==== | ||
− | {{definition|Distributed denial-of-service ''attack'': Where many networked devices try to communicate with another at the same time, causing the targeted device to be significantly slower to respond or cease to function. <ref>[https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/686089/Secure_by_Design_Report_.pdf Secure by Design: Improving the cyber security of consumer Internet of Things Report (2018)]</ref>}}<br /><br /> | + | {{definition|Distributed denial-of-service ''attack'': Where many networked devices try to communicate with another at the same time, causing the targeted device to be significantly slower to respond or cease to function. <ref>[https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/686089/Secure_by_Design_Report_.pdf Secure by Design: Improving the cyber security of consumer Internet of Things Report (2018)]</ref>}} |
+ | ===== [[Bermuda]] ===== | ||
+ | {{definition|Distributed Denial of Service (DDoS): the intentional paralyzing of a computer network by flooding it with data sent simultaneously from many individual computers. <ref>[https://www.gov.bm/sites/default/files/10999-National-Cybersecurity-Strategy.pdf National Cyber Security Strategy 2018-2022]</ref>}}<br /><br /> | ||
====[[United States]]==== | ====[[United States]]==== | ||
Line 83: | Line 90: | ||
[[Category:Protection]][[Category:Resilience]][[Category:Civil Protection]] | [[Category:Protection]][[Category:Resilience]][[Category:Civil Protection]] | ||
− | {{#set:defined by=Australia|defined by=Canada|defined by=Burkina-Faso|defined by=France|defined by=Hong Kong|defined by=Jamaica|defined by=Kazakhstan|defined by=Kuwait|defined by=Liberia|defined by=Netherlands|defined by= Philippines|defined by=Senegal|defined by=Singapore|defined by=Tunisia|defined by=United Kingdom|defined by=United States|defined by=DHS|defined by=NIST}} | + | {{#set:defined by=Australia|defined by=Bermuda|defined by=Canada|defined by=Czech Republic|defined by=Burkina-Faso|defined by=France|defined by=Hong Kong|defined by=Jamaica|defined by=Kazakhstan|defined by=Kuwait|defined by=Liberia|defined by=Netherlands|defined by= Philippines|defined by=Senegal|defined by=Singapore|defined by=Tunisia|defined by=United Kingdom|defined by=United States|defined by=DHS|defined by=NIST}} |
{{#set: Showmainpage=Yes}} | {{#set: Showmainpage=Yes}} |
Revision as of 20:26, 6 March 2020
Contents
- 1 Definitions
- 1.1 National Definitions
- 1.1.1 Australia
- 1.1.2 Burkina-Faso
- 1.1.3 Canada
- 1.1.4 Czech Republic
- 1.1.5 France
- 1.1.6 Hong Kong
- 1.1.7 Jamaica
- 1.1.8 Kazakhstan
- 1.1.9 Kuwait
- 1.1.10 Liberia
- 1.1.11 Netherlands
- 1.1.12 New Zealand
- 1.1.13 Philippines
- 1.1.14 Senegal
- 1.1.15 Singapore
- 1.1.16 Tunisia
- 1.1.17 United Kingdom
- 1.1.18 United States
- 1.1 National Definitions
- 2 See also
- 3 Notes
Definitions
National Definitions
Australia
These attacks often flood targeted systems with requests until they are unable to respond.
Burkina-Faso
La méthode la plus classique consiste à faire crouler le serveur sous une masse de requêtes généralement mal formées pour entraîner une réponse anormale et paralysante. Une attaque distribuée venant de plusieurs sources est appelée DDoS.
Examples of a remote DoS are SYS-a. PING-flooding or E-mail bombing (DDoS: TFN, Trinity, etc.) However, the availability also can be affected by local actions (destruction, disruption of power supply, etc.).
Canada
Distributed Denial-of-Service attack: An attack in which multiple compromised systems are used to attack a single target. The flood of incoming messages to the target system forces it to shut down and denies service to legitimate users. [4]
Attaque par déni de service: L’attaque par déni de service (DoS pour Denial of Service) consiste en une activité visant à rendre un service inutilisable ou à ralentir l’exploitation et les fonctions d’un système donné.
Attaque par déni de service distribué: Attaque par laquelle une multitude de systèmes compromis visent une même cible. Le flux de messages envoyés est tel qu’il provoque une panne du système ciblé et l’interruption des services offerts aux utilisateurs légitimes. [5]
Czech Republic
Distributed denial of service (DDoS): Distributed denial of service is the technique of attack by many coordinated attackers on the internet services or pages resulting in flooding by requests or breakdown or unfunctionality or unavailability of the system for other users. [6]
Denial of service (DoS): Denial of service is the technique of attack by many coordinated attackers on the internet services or pages resulting in flooding by requests or breakdown or unfunctionality or unavailability of the system for other users. [6]
France
Hong Kong
Denial-of-Service: An attacker attempts to prevent legitimate users from accessing information or services. Examples of such attacks are SYN flood, Ping O death, packet flooding and Ping flooding. [8]
Distributed Denial of Service (DDoS): An attack using multiple computers to launch denial-of-service (DoS) attacks at the same time against a targeted system. [9]
Jamaica
Kazakhstan
DDoS - (от англ. Distributed Denial-of-Service) – распределенная атака типа отказ в обслуживании, которая являет собой одну из самых распространенных и опасных сетевых атак. В результате атаки нарушается или полностью блокируется обслуживание законных пользователей, сетей, систем и иных ресурсов.
DDoS - distributed denial-of-service attack is an attempt to make a machine or network resource unavailable to its intended users. A DoS attack generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. As clarification, distributed denial-of-service attacks are sent by two or more people, or bots, and denial-of-service attacks are sent by one person or system. [11]
Kuwait
Liberia
Netherlands
New Zealand
Philippines
Senegal
Singapore
Tunisia
The most common method is to cram the server under a mass of queries usually poorly formed to cause an abnormal response and paralyzing. A distributed attack from multiple sources is called DDoS.
United Kingdom
Bermuda
United States
DHS
NIST
See also
Notes
- ↑ Protective Security Policy Framework - Glossary Oct 2017
- ↑ on-line glossary Stay Safe On-line
- ↑ 3.0 3.1 CIRT-BF Glossary
- ↑ Glossary - Canadian Centre for Cyber Security
- ↑ Glossaire - Centre Canadien pour la Cybersécurité
- ↑ 6.0 6.1 6.2 6.3 [1]
- ↑ Revue stratégique de cyberdéfense 12 février 2018
- ↑ Information Security Glossary
- ↑ Information Security Glossary
- ↑ Jamaica's National Cyber Security Strategy
- ↑ CERT.Gov.KZ Glossary
- ↑ Glossary Communication and Information Technology Regulatory
- ↑ Government of Liberia’s Policy for the Telecommunications and Information Communications Technology (ICT) sectors
- ↑ 14.0 14.1 Cyber Security Beeld Nederland 2018
- ↑ Handreiking Cybercrime (2012)
- ↑ New Zealand’s Cyber Security Strategy (2019)
- ↑ NHS Cyber security glossary
- ↑ NHS Cyber security glossary
- ↑ STRATÉGIE NATIONALE DE CYBERSÉCURITÉ DU SÉNÉGAL (SNC2022)
- ↑ Singapore Cyber Landscape 2017
- ↑ ANSI Glossary
- ↑ Secure by Design: Improving the cyber security of consumer Internet of Things Report (2018)
- ↑ National Cyber Security Strategy 2018-2022
- ↑ 24.0 24.1 DHS/NICSS Glossary
- ↑ 25.0 25.1 25.2 NIST Glossary