![buku jaringan komputer buku jaringan komputer](https://s4.bukalapak.com/img/4880482643/large/7.jpg)
Therefore, the attacker cannot overwhelm the network IP address and disrupt communication between a server and its client that may reject user’s request access to a system or a network service provided by a host. This study concludes that securing techniques should be implemented extra carefully on DoS attacks (Denial-of-Service Attacks).
![buku jaringan komputer buku jaringan komputer](https://penerbitbukudeepublish.com/wp-content/uploads/2020/09/Jaringan-Komputer_Agung-Suprapto-rev-2.0-convert-cover-depan-scaled.jpg)
![buku jaringan komputer buku jaringan komputer](https://ebooks.gramedia.com/ebook-covers/58947/image_highres/BLK_MSDJKDLU202046109.jpg)
The result of this research is a method to overcome denial of service attack as well as the prevention techniques. The purpose of this paper is to analyze the cause of the denial of service attack on a web system using literature study. It makes the user unable to log into the network system. There is an attempt of certain parties to prevent a user access to a system or network by flooding the traffic network with so much data from unregistered users. denial of service attacks is one of the web security systems which can inhibit the activity of the work of a service even turn it off, so the authorized user cannot use the service. When a data is sent from one computer to another on the Internet, it will pass through a number of other computers that are meant to give the user an opportunity to take over one or several computers. Internet network which is public and global is unsafe, so the security of public Internet-based information system needs to be considered. Server, denial of service, attack, internet, network Abstract