Skip to content
Science, Maths & Technology

Source of denial

Updated Thursday 16th December 2010

Following the recent spates of denial of service attacks by hackers supporting Wikileaks, Tony Hirst offers some insight into what's involved

When a browser makes a request to a web server, it looks up the IP address for the server from one or more DNS providers, and then uses the physical address returned to make a connection to the actual webserver that publishes the content (see this article for more information). Webservers (and domain name servers) are like bar staff: they can only serve so many customers at once. In a distributed denial of service attack, multiple (ie, distributed) computers all try to request the same page at the same time. The server gets flustered, and handles as many requests as it can, but there are going to be some requests that can't be handled. Access is denied to those requests, and the website appears to the use to be down.

DDOS attacks are certainly inconvenient, but they're not really cyber war. LOIC (Low Orbit Ion Cannon), the tool used by the Anonymous collective that has been carrying out the DOS attacks to protest against the Wikileaks backlash, is a simple application typically used for testing web servers' capacity to handle a particular volume of requests. A feature of LOIC means that it can be controlled remotely using a protocol known as IRC (Internet Relay Chat), a forerunner to instant messaging favoured by system administrators. By stirring up emotions on Twitter and Facebook, the Anonymous collective encouraged others to download LOIC and turn control over to Anonymous, so they could mount attacks on websites deemed to be antagonistic to Wikileaks such as PayPal, Mastercard and Visa, all of whom had stopped supporting user donations to Wikileaks.

But beware: whilst participating in DDOS attack may feel the same a taking part in a sit-in, or standing on a picket line or barricade to prevent access to a physical location, in the UK at least the Police and Justice Act 2006 makes it illegal. And on purely sensible terms, voluntarily turning control of your computer to a self-declared hacker network is tantamount to madness!

 

For further information, take a look at our frequently asked questions which may give you the support you need.

Have a question?

Other content you may like

Telegram brief history. Stop Copyrighted image Icon Copyright: Photowitch | Dreamstime.com - Morse Code On Telegraph Photo article icon

Science, Maths & Technology 

Telegram brief history. Stop

What can the history of the telegram tell us about our own hopes and fears of modern technologies? 

Article
Digital skills Copyrighted image Icon Copyright: © Andrey Popov | Dreamstime.com activity icon

Science, Maths & Technology 

Digital skills

Are you looking to expand your digital skills?

Activity
Laws for the Internet Age Creative commons image Icon Cory Doctorowlicensed for reuse under CC BY-SA 2.0 under Creative-Commons license article icon

Science, Maths & Technology 

Laws for the Internet Age

In this excerpt from his new book 'Information Doesn't Want To be Free: Laws for the Internet Age' Cory discusses 'Doctorow's First Law'.

Article
Email: a square peg in a round hole Copyrighted image Icon Copyright: photos.com article icon

Science, Maths & Technology 

Email: a square peg in a round hole

Geoffrey Einon offers some useful advice for managing the tide of emails.

Article
How a Geek Changed the World transcript Copyrighted image Icon Copyright: Production team article icon

Science, Maths & Technology 

How a Geek Changed the World transcript

Fiona Bruce met Bill Gates as he stepped down from his role at Microsoft. This is a record of their conversation.

Article
Natural intelligence Copyrighted image Icon Copyright: Used with permission free course icon Level 3 icon

Science, Maths & Technology 

Natural intelligence

One goal of artificial intelligence is to build machines that can operate in the real world, with all its noise and uncertainty. Much of what we want machines to do (see, recognise, navigate, move, coordinate) is already done very well by simple creatures. In this free course, Natural intelligence, we look at how such creatures achieve these goals and start to understand how we can build machines with the same capabilities.

Free course
10 hrs
What is a password manager - and should I be using one? Copyright free image Icon Copyright free: stevepb article icon

Science, Maths & Technology 

What is a password manager - and should I be using one?

Password managers can make keeping track of your online security a little easier. But are the downsides to using them?

Article
Some of all human knowledge: Wikipedia at 15 Creative commons image Icon Lane Hartwell for the Wikimedia Foundation under Creative Commons BY-SA 4.0 license article icon

Science, Maths & Technology 

Some of all human knowledge: Wikipedia at 15

Wikipedia has grown into the world's go-to source for information. This raises more problems than just a few missing citations...

Article
Welcome to the future Copyrighted image Icon Copyright: Crackerclips | Dreamstime.com article icon

Science, Maths & Technology 

Welcome to the future

How The Open University is leading a project that is transforming Milton Keynes into one of the world’s first ‘smart cities’.

Article