This document discusses denial of service (DoS) attacks. It defines DoS as an attack meant to make a machine or network unavailable to its intended users. Several common DoS attack methods are described, including ICMP floods, teardrop attacks, and reflected/spoofed attacks. The document also provides information on tools used for DoS attacks and discusses how to identify an attack, what to do in response, and how to avoid being part of the problem.