A distributed denial of service (DDoS) attack crippled Karnataka’s property registration portal Kaveri 2. 0 on Wednesday.
• Botnet Creation: Attackers infect multiple devices (computers, IoT devices, etc. ) with malware to form a botnet (network of compromised devices).
• Command & control: the attacker commands the botnet to execute an attack
• Traffic overload: the botnet floods the target system with so many requests that it uses all of its bandwidth, CPU, or memory
• Service disruption: the server is slow, crashes or becomes entirely unavailable to legitimate users
1. Volume-Based Attacks – Consume bandwidth to overwhelm the target.
• UDP Flood: Sends massive UDP packets to overload the system.
• ICMP Flood (Ping Flood): Floods the target with ICMP (ping) requests.
• DNS Amplification: Amplifies traffic toward the victim via open DNS resolvers.
2. Protocol Attacks - Exhaust server resources by exploiting weaknesses in network protocols.
• SYN Flood: Sends a lot of SYN (connection request) packets but does not complete the handshake.
• ACK Flood: Overloads the target with acknowledgment packets.
• Ping of Death: Sends large or badly formed packets to crash a system.
3. Application Layer Attacks – Target specific applications and services.
• HTTP Flood: Floods a web server with forged HTTP requests.
• Slowloris Attack - Opens many connections to a server but sends data slowly to consume resources
Also Read: Nano Rafts of DNA: Study of nature materials. Let know what it is!
• Website Downtime: Prevents users from accessing services.
• Financial Loss: Businesses suffer revenue loss due to unavailability.
• Reputation Damage: Customers lose trust in affected services.
• Legal Consequences – if user data is exposed or compliance policies are broken.
• To filter malicious traffic at your workspace, u se a Web Application Firewall (WAF
• Utilize Content Delivery Networks (CDNs) to distribute traffic load.
• Monitor Traffic Patterns to detect and block abnormal spikes.
• Employ DDoS Protection Services (Cloudflare, AWS Shield, Akamai, etc.).
King’s College London deepens India ties, records growth in student applications and enrollments
Obsolete, inadequate, unteachable: UGC’s Math draft draws sharp criticism
Adani triumphs as SEBI clears group of all Hindenburg fraud charges
The Sovereign’s Loop: Nepal’s Constitutional Crisis and a Path to Accountable Democracy
CJI Gavai calls for reimagining legal education with focus on access and values
Obsolete, inadequate, unteachable: UGC’s Math draft draws sharp criticism
Pakistan Army ordered to honor JeM terrorists at funerals, admits top commander
Meghalaya private university built on forest land, SC panel seeks ₹150 crore penalty, full restoration
CJI Gavai defends ‘ask the deity’ remark amid social media storm, stresses respect for all religions
Bombay High Court serves notices to NIA, Pragya Thakur in 2008 Malegaon blast case
King’s College London deepens India ties, records growth in student applications and enrollments
Obsolete, inadequate, unteachable: UGC’s Math draft draws sharp criticism
Adani triumphs as SEBI clears group of all Hindenburg fraud charges
The Sovereign’s Loop: Nepal’s Constitutional Crisis and a Path to Accountable Democracy
CJI Gavai calls for reimagining legal education with focus on access and values
Obsolete, inadequate, unteachable: UGC’s Math draft draws sharp criticism
Pakistan Army ordered to honor JeM terrorists at funerals, admits top commander
Meghalaya private university built on forest land, SC panel seeks ₹150 crore penalty, full restoration
CJI Gavai defends ‘ask the deity’ remark amid social media storm, stresses respect for all religions
Bombay High Court serves notices to NIA, Pragya Thakur in 2008 Malegaon blast case
Copyright© educationpost.in 2024 All Rights Reserved.
Designed and Developed by @Pyndertech