Allteks Logo

Allteks specialise in creating and managing bespoke IT infrastructure and support solutions to businesses throughout the UK.

As a managed IT service provider our services include end user support, server management, managed hosting services, managed security, cloud-based business continuity solutions, infrastructure design and strategic IT consultancy. That’s what makes us your complete IT service management partner.

Phone: +44 (0) 1622 763355

Business IT Support & Managed IT Service Specialists

Cybersecurity- DOS Attacks.


Cybersecurity- DOS Attacks.

Cybersecurity continues to be a source of concern for organisations large and small.   With a recent study showing over half of organisations are underprepared should a cyberattack happen.


DoS Attack- Cybersecurity.


In IT, a denial-of-service attack (DoS attack) is a cyber-attack where an attacker seeks to make a computer or network unavailable by indefinitely or temporarily disrupting services connected to the internet.


DoS essentially means making a computer or network unavailable for its users. A DoS attack is when one computer or internet connection overwhelm a server or network.


A DDoS attack is the same, but bigger. Launched from several host machines, a DDoS is a form of malicious software designed to disrupt a system’s functioning so it cannot produce service requests. Although an attacker cannot access secured information, it can take whole systems offline – deeply affecting productivity.


Cybersecurity: These are the five major types of DoS attacks.


Teardrop Attack.


A Teardrop attack is a kind of Denial of Service (DoS) attack which works by steadily sending messages of incomplete data, known as ‘packets’ to the targeted machine. Unable to make sense of the fragments, the targeted machine continues to accumulate the incomplete information until it becomes overwhelmed and crashes.


TCP SYN Cyber Attack


A TCP SYN is where the hacker manipulates the use of the buffer space during a Transmission Control Protocol (TCP). Here, the hacker’s device inundates the targeted system with connection requests. When the targeted system responds, but the hacker’s system does not reply, then this causes the targeted system to timeout and crash.


Low-Rate Denial-of-Service Attacks


Despite the name, this is still a destructive attack. The Low-rate DoS (LDoS) attack can be challenging to detect and block. Essentially, small data packets are sent to attempt to stop web service and damage systems.


Peer-To-Peer Attacks


In a peer to peer DOS attack, an attacker attempts to take advantage of bugs within peer-to-peer servers leading to servers being overwhelmed with malevolent data packets.


Internet Control Message Protocol (ICMP) Flood


Otherwise know as a smurf attack, which is sadly not anything to do with small blue creatures. A Smurf attack gets its name after the DOS tool which is called a Smurf. During a Smurf attack, an attacker will spoof the targeted computers IP, and the result is the overwhelm the network.



We understand that this can all seem very confusing. Protecting business data is becoming more of a priority for businesses large and small.   We hosted a FREE webinar in September, giving a guide to cybersecurity suitable for charities, businesses and public services.  Click here to watch. 


Read more about cybersecurity in our blog: 3 Ways To Better Secure Your Credit Card Data


We Are Here To Help You, Why Not Speak With Us Today?