A distributed denial of service (DDoS) attack crippled Karnataka’s property registration portal Kaveri 2. 0 on Wednesday.

• Botnet Creation: Attackers infect multiple devices (computers, IoT devices, etc. ) with malware to form a botnet (network of compromised devices).
• Command & control: the attacker commands the botnet to execute an attack
• Traffic overload: the botnet floods the target system with so many requests that it uses all of its bandwidth, CPU, or memory
• Service disruption: the server is slow, crashes or becomes entirely unavailable to legitimate users
1. Volume-Based Attacks – Consume bandwidth to overwhelm the target.

• UDP Flood: Sends massive UDP packets to overload the system.
• ICMP Flood (Ping Flood): Floods the target with ICMP (ping) requests.
• DNS Amplification: Amplifies traffic toward the victim via open DNS resolvers.
2. Protocol Attacks - Exhaust server resources by exploiting weaknesses in network protocols.
• SYN Flood: Sends a lot of SYN (connection request) packets but does not complete the handshake.
• ACK Flood: Overloads the target with acknowledgment packets.
• Ping of Death: Sends large or badly formed packets to crash a system.
3. Application Layer Attacks – Target specific applications and services.
• HTTP Flood: Floods a web server with forged HTTP requests.
• Slowloris Attack - Opens many connections to a server but sends data slowly to consume resources
Also Read: Nano Rafts of DNA: Study of nature materials. Let know what it is!
• Website Downtime: Prevents users from accessing services.
• Financial Loss: Businesses suffer revenue loss due to unavailability.
• Reputation Damage: Customers lose trust in affected services.
• Legal Consequences – if user data is exposed or compliance policies are broken.
• To filter malicious traffic at your workspace, u se a Web Application Firewall (WAF
• Utilize Content Delivery Networks (CDNs) to distribute traffic load.
• Monitor Traffic Patterns to detect and block abnormal spikes.
• Employ DDoS Protection Services (Cloudflare, AWS Shield, Akamai, etc.).

Delhi rolls out upgraded education portal with grievance and academic features

Union Cabinet clears proposal to rename Kerala as ‘Keralam’

KIET School of Management unveils “MANIFEST 2K26” with grandeur and innovation

JNU campus tense after late-night protest march turns violent

Madhya Pradesh to introduce temple management courses in universities

SC warns jail terms cannot be ‘purchased’ with money, sets aside Madras HC relief in attempt-to-murder case

NCERT flags ‘corruption in judiciary’ and 5.3 crore case backlog in new Class 8 textbook

Seven killed as Ranchi–Delhi air ambulance crashes in Jharkhand forest

CJI Surya Kant issues stern warning to lawyer over Ambani–Adani comparison in court

Government asks Indians to leave Iran amid rising tensions

Delhi rolls out upgraded education portal with grievance and academic features

Union Cabinet clears proposal to rename Kerala as ‘Keralam’

KIET School of Management unveils “MANIFEST 2K26” with grandeur and innovation

JNU campus tense after late-night protest march turns violent

Madhya Pradesh to introduce temple management courses in universities

SC warns jail terms cannot be ‘purchased’ with money, sets aside Madras HC relief in attempt-to-murder case

NCERT flags ‘corruption in judiciary’ and 5.3 crore case backlog in new Class 8 textbook

Seven killed as Ranchi–Delhi air ambulance crashes in Jharkhand forest

CJI Surya Kant issues stern warning to lawyer over Ambani–Adani comparison in court

Government asks Indians to leave Iran amid rising tensions
Copyright© educationpost.in 2024 All Rights Reserved.
Designed and Developed by @Pyndertech