{"id":26518,"date":"2022-04-19T15:54:00","date_gmt":"2022-04-19T13:54:00","guid":{"rendered":"https:\/\/perseus.de\/attaque-dos-et-ddos\/"},"modified":"2026-03-30T09:52:51","modified_gmt":"2026-03-30T07:52:51","slug":"attaque-dos-et-ddos","status":"publish","type":"post","link":"https:\/\/perseus.de\/fr\/attaque-dos-et-ddos\/","title":{"rendered":"Attaque DOS et DDOS"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"26518\" class=\"elementor elementor-26518 elementor-22218\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cab3f18 e-flex e-con-boxed e-con e-parent\" data-id=\"cab3f18\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2a02b8b e-con-full e-flex e-con e-child\" data-id=\"2a02b8b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f80ded elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"4f80ded\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Attaque DOS et DDOS\n<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d061a7 elementor-widget elementor-widget-image\" data-id=\"2d061a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png\" class=\"attachment-medium size-medium wp-image-25818\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-150x150.png 150w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-768x768.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-51ab00bb e-flex e-con-boxed e-con e-parent\" data-id=\"51ab00bb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6deddd21 e-con-full e-flex e-con e-child\" data-id=\"6deddd21\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e839854 elementor-widget elementor-widget-text-editor\" data-id=\"e839854\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<header class=\"Single__header Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size6D\"><div class=\"Share\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><p>DOS signifie Denial of Service (d\u00e9ni de service). Cela se traduit litt\u00e9ralement par \u00ab d\u00e9ni de service \u00bb. Plus appropri\u00e9 serait \u00ab indisponibilit\u00e9 du service \u00bb. Cela s\u2019explique par le fait qu\u2019une attaque DOS vise d\u00e9lib\u00e9r\u00e9ment \u00e0 surcharger un syst\u00e8me au point qu\u2019il ne puisse plus effectuer ses t\u00e2ches \u2013 le service qu\u2019il propose n\u2019est plus disponible. En cons\u00e9quence, par exemple, le site web de l\u2019entreprise ne peut plus \u00eatre accessible, la production peut s\u2019arr\u00eater ou le service client peut \u00eatre coup\u00e9 du trafic par e-mail. DDOS est l\u2019abr\u00e9viation de Distributed Denial of Service. Cela s\u2019explique par le fait que, lors d\u2019une attaque DDOS, la surcharge d\u00e9lib\u00e9r\u00e9e est caus\u00e9e par diverses sources d\u00e9centralis\u00e9es. Cela rend une telle attaque tr\u00e8s difficile \u00e0 contenir.       <\/p><h4>Que signifient en d\u00e9tail les attaques DOS et DDOS ?<\/h4><div> <\/div><p><b>Attaques DOS<\/b><\/p><ul><li>En gros, de nombreuses attaques DOS et DDOS sont effectu\u00e9es en envoyant plus de requ\u00eates \u00e0 un syst\u00e8me cible qu\u2019il ne peut en g\u00e9rer.<\/li><li>Dans une attaque DOS, toutes ces requ\u00eates proviennent d\u2019une seule source, comme l\u2019ordinateur d\u2019un cybercriminel.<br>Cette attaque peut \u00eatre arr\u00eat\u00e9e en n\u2019acceptant plus les demandes provenant d\u2019une seule source.<\/li><li>Une attaque DOS peut aussi r\u00e9ussir sans requ\u00eate : si elle exploite des bugs qui provoquent le plantage du syst\u00e8me cible et ne peut plus \u00eatre atteint.<\/li><\/ul><p><b>Attaques DDOS<\/b><\/p><ul><li>Dans une attaque DDOS, de nombreuses sources diff\u00e9rentes envoient des requ\u00eates. Ces sources sont souvent des ordinateurs partout dans le monde qui forment un botnet criminel \u2013 sans que leurs propri\u00e9taires en soient inform\u00e9s. <\/li><li>Dans une attaque DDOS, les requ\u00eates sont faites depuis tellement de sources diff\u00e9rentes qu\u2019elles ne peuvent pas \u00eatre sp\u00e9cifiquement bloqu\u00e9es.<\/li><\/ul><p><b>Toutes les attaques DOS et DDOS constituent des infractions p\u00e9nales. Ils peuvent \u00eatre bas\u00e9s sur diverses motivations : <\/b><\/p><ul><li>Vandalisme<\/li><li>Activisme politique<\/li><li>Sabotage (par exemple au nom d\u2019une entreprise concurrente)<\/li><li>Extorsion (lorsqu\u2019une ran\u00e7on est exig\u00e9e pour arr\u00eater l\u2019attaque) \u2013<\/li><li>Comme distraction, par exemple d\u2019une attaque contre un autre syst\u00e8me appartenant \u00e0 une entreprise<\/li><li>Pour rediriger les requ\u00eates l\u00e9gitimes vers le syst\u00e8me attaqu\u00e9 vers un syst\u00e8me d\u00e9faillant.<\/li><\/ul><h3> <\/h3><h4>O\u00f9 est-ce que je rencontre le sujet des attaques DOS et DDOS dans mon travail quotidien ?<\/h4><div> <\/div><p>Plus pr\u00e9cis\u00e9ment, vous ne le rencontrerez qu\u2019en cas d\u2019attaque. Les signes sont, par exemple, l\u2019inaccessibilit\u00e9 du site web de votre entreprise, l\u2019arr\u00eat de production ou la panne de communication \u00e9lectronique. N\u00e9anmoins, ils peuvent contribuer \u00e0 la pr\u00e9vention des attaques DOS et DDOS dans le travail quotidien.  <\/p><h4> <\/h4><h4>Que puis-je faire pour am\u00e9liorer ma s\u00e9curit\u00e9 ?<\/h4><div> <\/div><p>Presque toutes les mesures de base pour r\u00e9duire <a href=\"https:\/\/perseus.de\/2022\/04\/19\/cyberrisiko\/\">le risque cybern\u00e9tique<\/a> contrent \u00e9galement les attaques DOS et DDOS et aident \u00e0 emp\u00eacher que les ordinateurs appartenant \u00e0 l\u2019entreprise soient <a href=\"http:\/\/52.57.197.213\/2022\/04\/19\/botnetze\/\">connect\u00e9s \u00e0 des botnets<\/a> criminels. Votre administrateur peut prendre des mesures suppl\u00e9mentaires via <a href=\"https:\/\/perseus.de\/2022\/04\/20\/firewall\/\">les pare-feu<\/a>, les param\u00e8tres du serveur, etc. Une mesure importante est de s\u00e9curiser tous<a href=\"https:\/\/perseus.de\/2022\/04\/21\/internet-of-things-iot\/\">les appareils connect\u00e9s \u00e0 Internet<\/a>. Cela inclut, par exemple, des haut-parleurs, des montres, des cam\u00e9ras de surveillance et des babyphones. Ces appareils re\u00e7oivent rarement <a href=\"https:\/\/perseus.de\/2022\/04\/22\/passwortsicherheit\/\">des mots de passe forts<\/a> et leur firmware n\u2019est mis \u00e0 jour que sporadiquement. Cela les rend particuli\u00e8rement faciles pour les cybercriminels \u00e0 se connecter aux botnets et \u00e0 les utiliser abusivement pour des attaques DOS et DDOS.     <\/p><p>D\u2019autres informations int\u00e9ressantes sont disponibles sur la page th\u00e9matique \u00ab <a href=\"http:\/\/www.allianz-fuer-cybersicherheit.de\/ACS\/DE\/Informationspool\/Themen\/DDoS\/ddos.html\">Attaques DDoS dans le cyberespace<\/a> \u00bb de l\u2019Alliance for Cyber Security.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/header>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb1ddf2 e-flex e-con-boxed e-con e-parent\" data-id=\"cb1ddf2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b58c442 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"b58c442\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Attaque DOS et DDOS DOS signifie Denial of Service (d\u00e9ni de service). Cela se traduit litt\u00e9ralement par \u00ab d\u00e9ni de service \u00bb. Plus appropri\u00e9 serait \u00ab indisponibilit\u00e9 du service \u00bb. Cela s\u2019explique par le fait qu\u2019une attaque DOS vise d\u00e9lib\u00e9r\u00e9ment \u00e0 surcharger un syst\u00e8me au point qu\u2019il ne puisse plus effectuer ses t\u00e2ches \u2013 le [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[58],"tags":[],"class_list":["post-26518","post","type-post","status-publish","format-standard","hentry","category-cyberlexique"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Attaque DOS et DDOS - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/fr\/attaque-dos-et-ddos\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Attaque DOS et DDOS - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Attaque DOS et DDOS DOS signifie Denial of Service (d\u00e9ni de service). Cela se traduit litt\u00e9ralement par \u00ab d\u00e9ni de service \u00bb. Plus appropri\u00e9 serait \u00ab indisponibilit\u00e9 du service \u00bb. Cela s\u2019explique par le fait qu\u2019une attaque DOS vise d\u00e9lib\u00e9r\u00e9ment \u00e0 surcharger un syst\u00e8me au point qu\u2019il ne puisse plus effectuer ses t\u00e2ches \u2013 le [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/fr\/attaque-dos-et-ddos\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-19T13:54:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T07:52:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/attaque-dos-et-ddos\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/attaque-dos-et-ddos\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Attaque DOS et DDOS\",\"datePublished\":\"2022-04-19T13:54:00+00:00\",\"dateModified\":\"2026-03-30T07:52:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/attaque-dos-et-ddos\\\/\"},\"wordCount\":623,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/attaque-dos-et-ddos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"articleSection\":[\"Cyberlexique\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/attaque-dos-et-ddos\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/attaque-dos-et-ddos\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/attaque-dos-et-ddos\\\/\",\"name\":\"Attaque DOS et DDOS - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/attaque-dos-et-ddos\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/attaque-dos-et-ddos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"datePublished\":\"2022-04-19T13:54:00+00:00\",\"dateModified\":\"2026-03-30T07:52:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/attaque-dos-et-ddos\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/attaque-dos-et-ddos\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/attaque-dos-et-ddos\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/attaque-dos-et-ddos\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Attaque DOS et DDOS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Attaque DOS et DDOS - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/fr\/attaque-dos-et-ddos\/","og_locale":"fr_FR","og_type":"article","og_title":"Attaque DOS et DDOS - Perseus Technologies","og_description":"Attaque DOS et DDOS DOS signifie Denial of Service (d\u00e9ni de service). Cela se traduit litt\u00e9ralement par \u00ab d\u00e9ni de service \u00bb. Plus appropri\u00e9 serait \u00ab indisponibilit\u00e9 du service \u00bb. Cela s\u2019explique par le fait qu\u2019une attaque DOS vise d\u00e9lib\u00e9r\u00e9ment \u00e0 surcharger un syst\u00e8me au point qu\u2019il ne puisse plus effectuer ses t\u00e2ches \u2013 le [&hellip;]","og_url":"https:\/\/perseus.de\/fr\/attaque-dos-et-ddos\/","og_site_name":"Perseus Technologies","article_published_time":"2022-04-19T13:54:00+00:00","article_modified_time":"2026-03-30T07:52:51+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Xenia Silbe","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/fr\/attaque-dos-et-ddos\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/fr\/attaque-dos-et-ddos\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Attaque DOS et DDOS","datePublished":"2022-04-19T13:54:00+00:00","dateModified":"2026-03-30T07:52:51+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/fr\/attaque-dos-et-ddos\/"},"wordCount":623,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/fr\/attaque-dos-et-ddos\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","articleSection":["Cyberlexique"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/fr\/attaque-dos-et-ddos\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/fr\/attaque-dos-et-ddos\/","url":"https:\/\/perseus.de\/fr\/attaque-dos-et-ddos\/","name":"Attaque DOS et DDOS - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/fr\/attaque-dos-et-ddos\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/fr\/attaque-dos-et-ddos\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","datePublished":"2022-04-19T13:54:00+00:00","dateModified":"2026-03-30T07:52:51+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/fr\/attaque-dos-et-ddos\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/fr\/attaque-dos-et-ddos\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/fr\/attaque-dos-et-ddos\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/fr\/attaque-dos-et-ddos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Attaque DOS et DDOS"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/fr\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26518","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/comments?post=26518"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26518\/revisions"}],"predecessor-version":[{"id":26519,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26518\/revisions\/26519"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media?parent=26518"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/categories?post=26518"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/tags?post=26518"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}