Back to the Blog
Cybersecurity

What Is a Denial-of-Service Attack?

Ronald Bushnell

Woman Using Computer in Office

A denial-of-service attack is a digital roadblock that prevents your legitimate users from accessing your business. Unlike a data breach, where files are stolen, this type of DDoS attack simply disrupts your ability to function by flooding your systems.

In approximately one year of operation, Anonymous Sudan’s DDoS tool was used to launch more than 35,000 DDoS attacks, causing more than $10 million in damages to U.S. victims, according to the U.S. Department of Justice.

Instead of stealing data, cybercriminals overwhelm a target server, website, or internet connection with more network traffic than it can handle. That traffic consumes bandwidth, CPU, and other network resources until systems slow down or stop responding. For small and mid-sized businesses, the impact feels like a sudden outage. Your web application fails to load, remote staff lose network connectivity, and customers abandon purchases.

You may hear the terms DoS and DDoS attacks used interchangeably. Both disrupt availability. The difference is scale. In this guide, you will see how a denial-of-service attack works, how to recognize warning signs, and what practical DDoS protection reduces business disruption.

Key Takeaways

  • DoS and DDoS attacks aim to knock services offline, not steal data (though distractions happen).
  • Early detection and appropriate protections (CDN/WAF, rate limiting, monitoring) reduce impact and preserve network performance.
  • The best response is containment, escalation, and recovery, not improvisation.

DoS vs. DDoS

DoS = one source, DDoS = many sources (botnets)

A DoS attack, short for denial-of-service attack, comes from a single source. One system sends excessive requests to a target server or internet link until capacity is exhausted. 

In contrast, a DDoS attack stands for distributed denial-of-service. Instead of a single source, multiple systems can send malicious traffic simultaneously. These distributed denial-of-service attacks are far harder to block because stopping one source does not stop the others.

Common targets: websites, VPNs, email gateways, SaaS logins

Most DDoS attacks rely on a botnet, a network of compromised computers or IoT devices controlled remotely by attackers. 

Scale is not theoretical; the “Rapper Bot” DDoS-for-hire botnet conducted over 370,000 attacks between April 2025 and the date of the complaint, according to the U.S. Department of Justice. These attacks hit everything from your website to your remote endpoint and email gateways.

Why “traffic” can be malicious even if it looks normal

Some cyber attacks target the network layer, flooding routers and firewalls with UDP, TCP, or ICMP traffic. A syn flood abuses the Transmission Control Protocol handshake. Other vectors target the application layer and mimic legitimate traffic, forcing your web servers to process expensive requests. Hackers may also use amplification, spoofed packets, or methods such as the ping of death, smurf attack, or slowloris to exhaust network bandwidth.

Common signs your business is under attack

Site/app suddenly slow or unavailable

For many teams, the first sign of a denial-of-service attack is performance degradation. Your web servers become slow or your web application times out completely.

Spikes in bandwidth/CPU/logins

You might see a sudden spike in network traffic or bandwidth without a clear business reason. CPU usage climbs on target servers even though staff activity appears normal. Authentication systems may show login surges or repeated failed attempts.

Customer reports before monitoring alerts

DNS queries slow down, and customers often report errors before monitoring tools trigger alerts. Endpoint systems such as VPN gateways, routers, and firewalls experience strain from malicious traffic.

“Intermittent” outages that come in waves

You may notice unusual IP address patterns from unexpected regions. When unexplained bandwidth spikes and service instability appear together, a DoS or DDoS attack is a strong possibility. Treat this as a cybersecurity risk.

What attackers are trying to achieve

Extortion (“pay to stop”)

Some hackers use DDoS attacks for extortion, similar to ransomware but focused on availability. In 2024, the FBI’s Internet Crime Complaint Center logged 86,415 extortion complaints.

Disruption to damage trust

The goal is often pure disruption. Cybercriminals want your systems offline so customers cannot transact. Hacktivist groups may also use distributed denial-of-service techniques to create visibility for a cause.

Smokescreen for another attack (possible, not always)

Hackers may use denial-of-service activity as a smokescreen to distract your team while they probe for vulnerabilities elsewhere. The FBI reports that 2024 saw a 33% increase in reported losses, totaling over $16 billion. This traffic can obscure malware during broader cyber attacks.

The Business Impact for small and medium-sized businesses

Revenue loss and missed leads

For small and medium-sized businesses (SMBs), an outage quickly turns into revenue loss. If your ordering portal fails, transactions stop, and legitimate users may leave and not return.

Productivity hits (remote access/VPN disruption)

Remote teams feel the impact when endpoint systems or authentication struggle. If the VPN is down, productivity drops.

Reputation and customer trust

Reputation matters. In the MetLife and U.S. Chamber Small Business Index, 60% of small businesses reported being concerned about cybersecurity threats.

Recovery costs and vendor coordination

Recovery costs escalate quickly. Uptime Intelligence reports that 54% of organizations said their most recent serious outage cost more than $100,000.

Prevention basics that actually help

CDN/WAF basics (what they do at a high level)

A content delivery network (CDN) distributes content across many locations. During a volumetric attack, the CDN absorbs traffic. A web application firewall (WAF) blocks suspicious patterns tied to application-layer attacks.

Rate limiting and traffic filtering

Rate limiting restricts the number of requests a single IP address can send, helping mitigate the impact of flood attacks on your web servers.

“Reduce your blast radius” (segmentation and resilient architecture—concept level)

By segmenting your network security, you ensure that an attack on one area doesn’t take down your entire company. This is a vital cybersecurity strategy.

Monitoring and alerting (what to watch)

Monitoring network traffic gives you early visibility into anomalies. Threat intelligence updates your firewalls as new attack vectors evolve.

What to do during an attack (High-level response steps)

Confirm incident and start an incident log

Verify that the observed symptoms align with a DoS or DDoS attack, and capture logs from network devices.

Escalate to ISP/CDN/WAF hosting provider

Notify your isp or cloud service immediately. Your service provider can often stop malicious traffic upstream.

Apply temporary controls (blocking, rate limits, geo rules—high level)

Enable DDoS protection and temporary controls like geo-blocking to stabilize network connectivity.

Communicate internally and set customer expectations (if needed)

Keep leadership and legitimate users informed to mitigate reputational cyber risk.

Post-incident review: what to harden next

After services stabilize, assess vulnerabilities and refine your network security plan.

Why Parachute is relevant for reducing DoS/DDoS disruption

Monitoring + escalation playbooks (so you’re not guessing)

Parachute provides monitoring for bandwidth spikes and outage patterns that signal a DDoS attack. We use predefined playbooks to mitigate risks fast.

Hardening web edge protections (CDN/WAF configuration support)

We review firewalls, routers, and web edge configurations to strengthen DDoS protection. For organizations on Microsoft or AWS, we ensure your settings are tuned.

Business continuity planning for “service down” scenarios

We help you plan for large-scale disruptions so you can maintain network performance even under pressure.

Vendor coordination during incidents (hosting, ISP, SaaS)

During an incident, our managed IT support helps coordinate with your service provider or isp to ensure a fast recovery.

Final thoughts: Downtime is the real risk

The primary risk of a denial-of-service attack is downtime. With the right DDoS protection and preparation, these events are survivable.

Talk to Parachute about hardening and monitoring your internet-facing systems.

FAQs

How do I determine whether a denial-of-service attack is causing our sudden outage?

Check for unexplained spikes in bandwidth, cpu, or login traffic. If web servers, VPNs, and DNS services slow down simultaneously, a denial-of-service attack is likely. Call your isp to start mitigation.

What is the difference between a DoS attack and a DDoS attack for SMBs?

A DoS attack originates from a single source, whereas a DDoS attack uses many compromised IoT devices. Distributed denial-of-service attacks are harder to block because they originate from many IP addresses.

What is the most effective way to reduce DDoS attack risk?

Deploy layered DDoS protection, including a CDN and WAF. Set rate limits on endpoints and review firewalls quarterly. Test your plan with your managed IT partner at least once per year.