Skip to content
Fast-turnaround security assessments available — 10+ years development & security experienceGet started
Back to Glossary
Glossary2 min read

Denial of Service (DoS)

An attack that disrupts a system's availability by overwhelming it with requests or exploiting a flaw that causes a crash.

A Denial of Service (DoS) attack aims to make a system, service, or network unavailable to its intended users by overwhelming it with traffic or exploiting a vulnerability that causes it to crash or become unresponsive. Unlike DDoS attacks that use distributed sources, a DoS attack typically originates from a single source but can still be devastating when it targets resource-intensive operations or exploits application-level weaknesses.

How It Works

DoS attacks fall into two main categories: volumetric and logic-based. Volumetric attacks flood the target with more traffic than it can handle, consuming bandwidth, CPU, memory, or connection capacity. Even from a single source, an attacker with sufficient bandwidth or access to an amplification technique can overwhelm an underpowered target.

Logic-based DoS attacks exploit specific vulnerabilities or design flaws to crash a service or make it unresponsive without requiring massive traffic volumes. A single carefully crafted request can sometimes crash a server by triggering an unhandled exception, causing infinite loop processing, or exhausting memory through a memory leak. Regular expression denial of service (ReDoS) exploits poorly written regex patterns that take exponential time to evaluate on certain inputs. A single request with a malicious string can tie up a server thread for minutes.

Application-layer DoS targets computationally expensive functionality. Search queries that trigger full table scans, file upload endpoints without size limits, API endpoints that generate complex reports, or functions that send external requests can all be abused to consume disproportionate server resources. An attacker repeatedly hitting an expensive endpoint can degrade service for all users without sending unusual volumes of traffic.

Why It Matters

Availability is a core security principle, and DoS attacks directly undermine it. Security assessments identify potential DoS vectors by examining resource-intensive functionality, input handling, and error management. Finding and fixing application-level DoS vulnerabilities is critical because these attacks can often be launched by a single attacker with minimal resources, making them accessible to a wide range of threat actors.

Need your application tested? Get in touch.

Need your application tested?

We find these vulnerabilities in real applications every day.

Request an Assessment