A distributed denial of service (DDoS) attack crippled Karnataka’s property registration portal Kaveri 2. 0 on Wednesday.
• Botnet Creation: Attackers infect multiple devices (computers, IoT devices, etc. ) with malware to form a botnet (network of compromised devices).
• Command & control: the attacker commands the botnet to execute an attack
• Traffic overload: the botnet floods the target system with so many requests that it uses all of its bandwidth, CPU, or memory
• Service disruption: the server is slow, crashes or becomes entirely unavailable to legitimate users
1. Volume-Based Attacks – Consume bandwidth to overwhelm the target.
• UDP Flood: Sends massive UDP packets to overload the system.
• ICMP Flood (Ping Flood): Floods the target with ICMP (ping) requests.
• DNS Amplification: Amplifies traffic toward the victim via open DNS resolvers.
2. Protocol Attacks - Exhaust server resources by exploiting weaknesses in network protocols.
• SYN Flood: Sends a lot of SYN (connection request) packets but does not complete the handshake.
• ACK Flood: Overloads the target with acknowledgment packets.
• Ping of Death: Sends large or badly formed packets to crash a system.
3. Application Layer Attacks – Target specific applications and services.
• HTTP Flood: Floods a web server with forged HTTP requests.
• Slowloris Attack - Opens many connections to a server but sends data slowly to consume resources
Also Read: Nano Rafts of DNA: Study of nature materials. Let know what it is!
• Website Downtime: Prevents users from accessing services.
• Financial Loss: Businesses suffer revenue loss due to unavailability.
• Reputation Damage: Customers lose trust in affected services.
• Legal Consequences – if user data is exposed or compliance policies are broken.
• To filter malicious traffic at your workspace, u se a Web Application Firewall (WAF
• Utilize Content Delivery Networks (CDNs) to distribute traffic load.
• Monitor Traffic Patterns to detect and block abnormal spikes.
• Employ DDoS Protection Services (Cloudflare, AWS Shield, Akamai, etc.).
ICAR's Agromet Advisory
Plan for Women's Cooperative
Transgender Policy of Tamil Nadu & 1956 Hindu Succession Act
Cabinet Approves ₹6,520 crore for PM Kisan Sampada Yojana
The Supreme Court postponed its decision on petitions contesting the age limit for couples wanting to have a child via surrogacy
NIA nabs key accused in massacre of Meitei women, children that shook Manipur
Race for VP begins after Dhankhar’s sudden exit; EC sets September 9 poll date
Voices for justice met with force: Aspirants thrashed, teachers detained as outrage over SSC mismanagement explodes
Trump’s tariff twist: US gives Pakistan, Bangladesh better trade terms than India
'Operation Mahadev' exposes Pakistan link: Phones, LoRa devices reveal trail of terror in Pahalgam
ICAR's Agromet Advisory
Plan for Women's Cooperative
Transgender Policy of Tamil Nadu & 1956 Hindu Succession Act
Cabinet Approves ₹6,520 crore for PM Kisan Sampada Yojana
The Supreme Court postponed its decision on petitions contesting the age limit for couples wanting to have a child via surrogacy
NIA nabs key accused in massacre of Meitei women, children that shook Manipur
Race for VP begins after Dhankhar’s sudden exit; EC sets September 9 poll date
Voices for justice met with force: Aspirants thrashed, teachers detained as outrage over SSC mismanagement explodes
Trump’s tariff twist: US gives Pakistan, Bangladesh better trade terms than India
'Operation Mahadev' exposes Pakistan link: Phones, LoRa devices reveal trail of terror in Pahalgam
Copyright© educationpost.in 2024 All Rights Reserved.
Designed and Developed by @Pyndertech