How often do you experience DOS attacks?


I recently changed positions, going from a relatively small, regional company to a working for a nationally known university. I almost never experienced DOS (denial of service) attempts before, but I sure do now. They rarely cause any problems, but the increase in frequency is amazing compared to what I was used to. Frankly, I had assumed that they weren't attempted all that often any longer. Apparently I was wrong. How common are these attempted DOS attacks?

Topic: Security
Answer this Question


2 total
Vote Up (15)

It's not an an issue that I've had to confront, but here's a good article on how to protect against such attacks.

Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks

Vote Up (14)

It definitely depends on where you work.  I've worked in IT at a university as well, and DDoS attacks happened multiple times every single day.  As you noted it generally isn't a problem because the pattern is so easy to identify, but they keep trying.  I can see how it could be a big problem for a company/organization that rarely experienced them and hadn't prepared for it though.       

Ask a question

Join Now or Sign In to ask a question.
Yelp has agreed to pay US$450,000 to the U.S. Federal Trade Commission to settle charges that the company accepted registrations to its services from children under 13 through its apps.
Apple on Tuesday began offering an additional security protection for iCloud account users, a move the company made following the theft of nude photos from several celebrities' accounts last month.
Hackers purportedly representing Anonymous hit Boston Children's Hospital with phishing and DDoS attacks this spring. The hospital fought back with vigilance, internal transparency and some old-fashioned sneakernet. That – and a little bit of luck – kept patient data safe.
A Citadel variant has been used against several Middle Eastern petrochemical companies, marking the first time the financial malware has been found in targeted attacks against companies.
Hackers evaded security systems for a year-and-a-half at a hosting center that processed payment cards for Goodwill Industries, using the same type of malware that struck Target and other major retailers to steal card data, according to the charity's software vendor.
The U.S. Congress is unlikely to pass legislation to end the National Security Agency's widespread collection of U.S. telephone records before leaving Washington, D.C., on a two-month break.
Customers cringe every time they hear about a bank, retail or healthcare hack that puts personal or financial data at risk. Today's hackers are after much more that credit card numbers, though -- and most firms are powerless to stop them.
While the capability to remotely wipe data from lost or stolen mobile phones may help CIOs sleep at night, it may be an outdated approach to BYOD security.
Cisco is bringing technology obtained through last year's acquisition of Sourcefire to its firewalls to enable threat-focused security for enterprises.
Wyvern securely rolls five programming languages into one.
Join us: