Denial-of-Service AttacksYou’re Being Targeted in a DoS Attack. What Now?

David Pirtle | October 13, 2025 | 12 min read

This featured video was created using artificial intelligence. The article, however, was written and edited by actual payment experts.

What are Denial-of-Service Attacks?

In a Nutshell

A denial-of-service (DoS) attack is where a hacker uses fake data requests to overwhelm your server’s ability to answer connection requests. In other words, they clog up your website with so many fake visitors that your real customers can’t get in. In this post, we explain how they work, why they’re so effective, and what you can do to protect your bottom line.

DoS Attacks: What Does “Denial-of-Service” Mean? How Do You Protect Your Organization?

Online shopping. Googling. Social media. Streaming movies and music. Working from home. The internet has become an integral part of our lives, but we sometimes overlook how much we rely on it.

And, as a result, how easily the balance of our lives can be disrupted.

A denial-of-service attack, or “DoS attack,” is a fairly primitive hacker trick. It relies on fake data requests to overwhelm a server and block access to legitimate users.

These assaults are nothing new. But, they’re growing in popularity as an easy and effective attack method, and have impacted many major companies in recent years. So how does a DoS attack work? Why are they so dangerous, and what can businesses do to protect their revenue?

What is a Denial-of-Service Attack?

Denial of Service Attack

[noun]/də • nī • əl • ov • sər • vəs/

A Denial of Service attack (or “DoS attack”) is an interruption in an authorized user's access to a computer network. This is often done maliciously by attackers who overload network servers through automated activity.

In simple terms, a DoS attack is an attempt to shut down a site or server by overloading it with fake users or false information. Although it’s often labeled as “hacking,” that’s not really correct. Instead of gaining access to a target’s systems, the idea is to block real users from accessing a specific online resource, such as an email account. 

They work because there’s a limit to how much CPU traffic a single system can handle. The DoS perpetrator uses automated programs to flood the targeted server with bogus requests for connection. Successful attacks will either crash the server or slow down access to the point at which legitimate users give up trying to access the site.

DoS tactics have been around for a long time. They’ve been used for many purposes, including both trolling and online activism. But, they can also be a tool for fraudsters, as we’ll see below.

While denial-of-service attacks had fallen out of the headlines for a while, the technique has recently seen a resurgence. One recent report estimates that DOS attacks are expected to increase by over 300% in 2023.

Did You Know?

A simple denial-of-service attempt can be launched from a single computer. In contrast, an organized attack that comes from multiple sources is referred to as a distributed denial-of-service, or DDoS.

Why Do DoS Attacks Happen?

TL;DR

Fraudsters sometimes use DoS attacks to distract from security breaches. In other cases, DoS attacks can be used to demand ransom from site owners and can even be deployed as part of state-sanctioned cyber attacks.

Like we referenced above, the reasons for denial-of-service assaults are varied.

Professional attacks may be an attempt to disrupt a competitor’s organization. Or, it may be to protest a social issue, or draw attention to a political cause. They could even be launched out of spite, or as a means of revenge.

In an earlier era of the internet, people commonly set DoS attacks in motion just to prove they could. Recently, we’ve seen more instances in which attacks are motivated by:

Geopolitics

Geopolitics

Governments or opposition political parties sometimes use DoS attacks against their enemies. We’ve seen this activity surge since the beginning of the War in Ukraine in particular. Both sides are using DoS attacks to either shut down important websites or block access to crucial servers, hoping to interfere with their opponent’s operations.

Monetary Gain

Monetary Gain

Extortion is also a common reason behind DoS attacks. Attackers can freeze up a website with fake traffic and blackmail the owner, who must pay to have the site released. Experts worry that this type of attack could be used against hospitals, power grids, or other critical services, where paying the ransom may literally be a matter of life or death.

Distraction

Distraction

Finally, it’s not uncommon for hackers to use a DoS attack as a distraction for a different, larger operation, such as a security breach. The assault keeps the target’s IT department so focused that the more dangerous crime is not discovered until it’s too late.

Common QuestionWhen do DoS attacks most often occur?DoS attacks happen most often during the fourth quarter of the year. This is because major shopping days like Black Friday, Cyber Monday, and Christmas Eve, are all clustered between October and December. By targeting periods when legitimate traffic is high and staff are already stretched thin, attackers can have a greater impact if their aim is to disrupt merchant operations.

How Do Denial-of-Service Attacks Work?

TL;DR

DoS attacks usually manifest as flooding attacks or buffer overflow attacks. Some variants, like “denial-of-inventory” attacks, are specifically used to target eCommerce merchants. Sometimes, DoS events can happen unintentionally, like when a site is overwhelmed by legitimate traffic.

As with most malicious online attacks, there are a variety of techniques for accomplishing the same goal. Most fall back on one of three tactics:

Flooding Attacks

An attacker saturates the targeted system with more HTTP requests than that system can handle. This leads to a flood of incomplete connections that eat up operating resources. The server becomes overwhelmed, slowing down or denying access to actual users.

Note that to be effective, a flooding attack requires the attacker to have more available bandwidth than the target. This is why many DoS attacks are distributed across multiple users (a distributed-denial-of-service, or “DDoS” attack).

Buffer Overflow Attacks

A buffer overflow attack doesn’t rely on a flood of individual connection requests. Rather, the attacker attempts to feed bigger information packets than a machine’s memory buffers can handle.

Once the server has maxed out all available disk space and memory, it can only create more space by overwriting portions of the buffer. Since those earlier connections have not yet been resolved, the memory stack becomes corrupted, leading to slower processing or a total crash.

Unintentional Cases

Sometimes, a DoS event turns out to be a natural occurrence. A recent example is the website for Ticketmaster, a US-based ticket sales and distribution company. Fans trying to secure tickets for the final days of Eurovision were frustrated when sessions timed out due to the slowness of the server before the entire system went down.

Did You Know?

eCommerce merchants can also be targeted by so-called “denial of inventory” attacks, where bad actors use bots to hoard inventory in shopping carts without the intention of ever making a purchase. This reduces items available for purchase by legitimate buyers and, in extreme cases, leads to widespread artificial stockouts.

Symptoms of a DoS Attack

TL;DR

High traffic from suspicious IP addresses, 503 “Service Unavailable” or “Gateway Timeout” errors, or unusually high server loads are common symptoms of a denial-of-service attack. However, being unable to access your site alone isn’t automatic evidence of a DoS attack.

Remember: denial of service can happen for very legitimate reasons. An overloaded server or a system with maxed-out memory do not necessarily indicate malicious activity.

It can be tricky to identify a malicious assault. That makes it important to recognize some of the most common red flags of an attack, including:

  • Inability to access a particular network or website
  • Unusually slow or irregular network performance
  • 503 “Service Unavailable” errors
  • Unexplainable spikes in network traffic
  • A large number of requests from the same IP address in a short period of time

For the best chance of detecting an attack, you really have to establish a benchmark for typical network activity over a given period of time. Knowing what’s “normal” for a given site enables you to distinguish possible DoS attacks in their early stages. 

When creating your baseline, be sure to factor in periods where an increase in traffic volume is to be expected. For instance, if you’re running an eCommerce business, you should expect a surge in activity during the holiday season. Then, once a normal traffic pattern has been established, it will need to be monitored on an ongoing basis.

Is My Site Experiencing a DoS Attack?

Unusually high server loads, sudden spikes in web traffic from suspicious geolocations, and “gateway timeout” errors can all be signs of a DoS attack. But, just because you can’t access your website doesn’t necessarily mean that you’re being targeted.

Hosting provider outages, DNS problems, or server-side hardware issues can sometimes explain why you’re not able to visit your site. Issues with your content management system (CMS), like plugin issues, code errors, or even an expired domain or hosting subscription, could also be more benign culprits.

Other times, you may see spikes in real, legitimate users — perhaps because a reel went viral or your Black Friday ad campaign performed above expectations. If this happens, forget about panicking; go celebrate instead!

Impact of DoS Attacks

TL;DR

A DOS attack can result in losses due to ransoms, lost productivity, brand damage, and chargebacks.

Dealing with denial-of-service attacks can be a serious hassle. Your site may be inaccessible for hours, even days, depending on the scale of the attack. That said, there are also some negative impacts to be aware of even beyond the scope of the attack itself, including:

Ransom Costs

The reason behind a DoS attack becomes immediately apparent if followed by a demand for payment. The attackers demand an exorbitant ransom payment, usually in cryptocurrency, before they’ll release the server. Of course, there’s no guarantee that the attack will stop, or that they won’t try again later, knowing that you’ll pay the ransom.

Other Financial Losses

Depending on the type of business, the costs of downtime can be staggering. A one-hour outage cost Amazon an estimated $34 million in sales in 2021, while a 20-minute crash that same year cost billions for Chinese eCommerce market Alibaba. For smaller organizations that don’t have as much leeway, having systems go down at all can be disastrous.

Save time. Recover revenue. Eliminate fraud attacks.

Request a Demo
The Original End-to-End Chargeback Management Platform

Lost Productivity

In the age of Zoom meetings and subscription software, inaccessible servers can be devastating to productivity. At the same time, IT departments and customer relations teams will be pulled from their normal activities as all resources are allocated to getting systems functional. This means hold ups and delays for other essential functions.

Brand Damage

Consumers need to feel you’ll be consistently online and available. Even one denial of service event could cause a customer to take their business elsewhere. Even worse, they may turn to review sites or social media channels to proclaim your lack of dependability.

Customer Disputes

One of the leading causes of customer disputes is poor service. A denial-of-service attack can make it difficult (or impossible) to resolve customer inquiries quickly and efficiently. Frustrated shoppers may decide it’s easier to call the bank and file a chargeback. If you’re a merchant, this will create even more financial stress for you than the initial attack.

Not convinced? Check out these startling DOS attack statistics:

68
Minutes

The average duration of a DoS attack

Source: Zayo

$6,000

Average losses per every minute that a DOS attack persists

Source: Zayo

358%

Increase in DoS attacks between Q1 2024 and Q1 2025

Source: Cloudflare

7.3
Terabits Per Second (Tbps)

Largest DoS attack by bandwidth in history

Source: Cloudflare

398M
Requests Per Second (RPS)

detected during the largest DoS attack as ranked by requests per second

Source: Google Cloud

How to Prevent DoS Attacks

TL;DR

Routine software updates, coupled with complementary network protection tools like antivirus software and firewalls, can help you prevent the bulk of DoS attacks.

So, we’ve explored questions like “What is a denial of service attack?” and “How can denial of service attacks affect you?” Now, it’s time to move on to the $64,000 question: “How do I protect my business from denial-of-service (dos) attacks?”

Just like with preventing chargebacks, no single solution can completely cure your DoS woes. Instead, you’ll be best protected when you take several complementary measures at once. Specifically, you should:

Use all Available Tools

Make sure your system administrators are deploying every type of DoS prevention at their disposal. There is no silver bullet here: you’ll likely need multiple tools and techniques to maximize protection. Check that your providers have preventative measures in place as well, and can balance loads across multiple servers if needed.

Maintain Malware Protection

While DoS attacks are designed to block access, some attackers take advantage of buffer overload and use the opportunity to install viruses and malware. It’s critical for organizations to maintain proven anti-virus and anti-malware solutions.

Monitor Systems

Implement strong firewalls and intrusion prevention systems, then use these tools to monitor traffic. Be sure monitoring systems are set to send alerts when traffic increases inexplicably. This may allow you to block suspicious traffic before serious damage is done.

Stay Up to Date

The best protection comes from using the most current software. Conducting regular updates ensure that you’re protected against new and developing tactics. You’ll want to install those updates as quickly as possible.

What DoS Attack Prevention Tools Are There?

When it comes to tools specifically aimed at DoS prevention, you have two options. The first is a web application firewall, or WAF. 

A WAF can complement your network firewall by blocking malicious HTTP requests that make it through your network firewall. Think about it like a secondary layer of defense that specifically protects your web apps and servers.

The second option for DOS attack prevention is to use a DoS mitigation provider, like Cloudflare, Akami, Radware, Imperva, or Lumen. In terms of pricing, these solutions can range from free (like Cloudflare) to thousands of dollars a month. The best option for you will depend on factors including your risk exposure, your monthly revenue, and your product vertical.
Again, there’s no killer app that is going to give you 100% protection against DOS attacks. But, these tools can help shield your business against volumetric, protocol, and application layer DoS attacks.

You Just Experienced a DoS Attack. Here’s How You Should Respond.

TL;DR

To respond to a DOS attack, you should notify your hosting provider, set up a “maintenance” page, scan for additional breaches, communicate across all customer service channels, and document the incident thoroughly.

In the aftermath of a DoS attack, every second counts. You can’t spend precious time looking for solutions.

What you need are actionable steps that you can implement now. So, here’s what you need to do:

Contact Your Hosting Provider

Instead of handling the DoS attack alone, your first call should be to your hosting provider or your DoS mitigation provider. Armed with technical expertise and tools, they can help you diagnose the nature of the attack, begin rerouting or blocking malicious traffic, and work on restoring service.

To help them help you, you need to give your service provider as much detail as possible. For instance, explain when you noticed the issue and the specific symptoms you’re encountering.

Set Up an “Under Maintenance” Page

Broken websites and error messages cause confusion and frustration for legitimate customers, so work quickly to signal that you’re looking for a fix.

To start, activate a static, pre-built “under maintenance” page. This allows you to project professionalism even during an outage and reassure visitors that you are aware of the problem. Although it seems simple and insignificant, this step can help bolster and preserve customer trust.

Scan for Secondary Security Breaches

Remember: DoS attacks aren’t always meant to be the knockout punch. Instead, they may be launched as a distraction for more damaging security breaches, such as data theft or payment fraud.

While your provider works on mitigating the DoS attack, have your security team immediately review your payment gateway, customer database, and admin logs for any suspicious activity that may have occurred in the moments before or during the attack.

Communicate Proactively on Other Channels

Your website may be down, but your other communication channels (hopefully) aren’t. Use social media and your email list to inform customers about the outage, and offer an estimate as to when service will be restored.

Keep it simple; you don’t need to provide technical details or even mention a DoS attack. An honest message alluding to technical difficulties will suffice. Doing so can give customers the information they need and help you limit unnecessary customer service inquiries.

Document the Incident

While it may be difficult to jot everything down live, a detailed post-mortem after the event can help your team recognize patterns and ward off the next one.

Be as detailed as you can. Note the exact time the attack began, when you contacted your provider, the specific actions they took, and when service was ultimately restored.

If possible, take screenshots of error messages, server load charts, or unusual traffic patterns. These details can help you conduct more thorough post-attack analysis, empower you to have more insightful conversations with your service providers, and streamline the cyber or fraud insurance claims filing process.

DoS Attack Management: A Long-Term Process

DoS attacks were once the go-to technique that cybercriminals and online activists alike relied on to disrupt the normal operation of digital services. As more sophisticated tools became available, interest in DoS attacks seemed to wane. But, they’re becoming popular once again.

These assaults may not directly cause the loss of money or data-related assets. However, they still end up costing organizations significant amounts of time and resources, and may lead to customer disputes and chargebacks.

The most effective method of DoS mitigation is to prevent attacks from happening in the first place.

Up-to-date systems and virus protection tools, employee training, and vigilance are all good methods of combating DoS attacks. Even if an attack is successful, having a response and recovery plan already in place can limit the impact.

In fact, prevention is usually the best way to deal with any type of computer-based crime, including fraud and account takeover attempts. A comprehensive strategy can help identify threats before they happen, and protect your business and revenue. To learn how we can help, speak to one of our experts today.

FAQs

What does a denial of service attack do?

DoS attacks are designed to slow or block access to your servers by overwhelming the system with too many requests, or slowing it down with malicious software.

What is the difference between DoS and DDoS?

Denial-of-service attacks typically come from one person or machine. Distributed-denial-of-service (DDoS) incidents use multiple machines, IP addresses, and systems, making it almost impossible to trace the actual attacker (or attackers).

How long will a DoS attack last?

The duration of a denial-of-service attack will vary by the tactics and techniques used. It’s also in flux right now, as there has been a surge in DoS activity following the war in Ukraine. In Q2 of 2021, the average DoS attack lasted 30 minutes. One year later, the average is more than 48 hours.

Can DoS attacks be stopped?

Simple DoS attacks can often be blocked through vigilance and good overall network security. More sophisticated assaults can be more difficult, though. Keep in mind that your host internet service provider should also have measures in place to prevent or stop DoS attacks.

Why do DoS attacks still work?

The basic reason is that online servers and systems have a limit to how much traffic they can process at one time. As long as attackers have more memory and processing speed, they can typically find a way to commit DoS attacks.

Is a DoS attack a crime?

Yes. According to the FBI and other law enforcement agencies, denial of service attacks fall under the category of cybercrimes, and perpetrators are routinely jailed for the activity.

What are the four types of DoS attacks?

There are three, rather than four, main types of denial-of-service (DoS) attacks. They are volumetric attacks, protocol attacks, and application attacks.

What is a real life example of a DoS attack?

One real-life example of a denial-of-service (DoS) attack occurred in May 2025 when network security company Cloudflare successfully blocked a 7.3 terabits per second (Tbps) attack, the largest ever recorded.

How are DoS attacks executed?

DoS attacks are executed by overwhelming a target system's resources with an excessive volume of traffic or resource-intensive requests. This prevents the system from handling legitimate user requests.

Like What You're Reading? Join our newsletter and stay up to date on the latest in payments and eCommerce trends.
Newsletter Signup
We’ll run the numbers; You’ll see the savings.
triangle shape background particle triangle shape background particle triangle shape background particle
Please share a few details and we'll connect with you!
Revenue Recovery icon
Over 18,000 companies recovered revenue with products from Chargebacks911
Close Form