A distributed denial of service (DDoS) attack crippled Karnataka’s property registration portal Kaveri 2. 0 on Wednesday.

• Botnet Creation: Attackers infect multiple devices (computers, IoT devices, etc. ) with malware to form a botnet (network of compromised devices).
• Command & control: the attacker commands the botnet to execute an attack
• Traffic overload: the botnet floods the target system with so many requests that it uses all of its bandwidth, CPU, or memory
• Service disruption: the server is slow, crashes or becomes entirely unavailable to legitimate users
1. Volume-Based Attacks – Consume bandwidth to overwhelm the target.

• UDP Flood: Sends massive UDP packets to overload the system.
• ICMP Flood (Ping Flood): Floods the target with ICMP (ping) requests.
• DNS Amplification: Amplifies traffic toward the victim via open DNS resolvers.
2. Protocol Attacks - Exhaust server resources by exploiting weaknesses in network protocols.
• SYN Flood: Sends a lot of SYN (connection request) packets but does not complete the handshake.
• ACK Flood: Overloads the target with acknowledgment packets.
• Ping of Death: Sends large or badly formed packets to crash a system.
3. Application Layer Attacks – Target specific applications and services.
• HTTP Flood: Floods a web server with forged HTTP requests.
• Slowloris Attack - Opens many connections to a server but sends data slowly to consume resources

Also Read: Nano Rafts of DNA: Study of nature materials. Let know what it is!
• Website Downtime: Prevents users from accessing services.
• Financial Loss: Businesses suffer revenue loss due to unavailability.
• Reputation Damage: Customers lose trust in affected services.
• Legal Consequences – if user data is exposed or compliance policies are broken.
• To filter malicious traffic at your workspace, u se a Web Application Firewall (WAF
• Utilize Content Delivery Networks (CDNs) to distribute traffic load.
• Monitor Traffic Patterns to detect and block abnormal spikes.
• Employ DDoS Protection Services (Cloudflare, AWS Shield, Akamai, etc.).

PhysicsWallah and Sunstone launch ‘Samvedna’ to strengthen student mental wellness support
.avif&w=256&q=75)
Supreme Court rejects challenge to demolition of 200-year-old Ujjain mosque

SC asks NBE to clarify policy on publishing NEET-PG answer keys

5 women among nine family members get life for brutal 2013 murder of UP farmer
.webp&w=256&q=75)
PM Modi accuses RJD of grooming ‘Rangdaars’, says record turnout jolted opposition

5 women among nine family members get life for brutal 2013 murder of UP farmer
.webp&w=256&q=75)
PM Modi accuses RJD of grooming ‘Rangdaars’, says record turnout jolted opposition

PM Modi flags off four new Vande Bharat trains, expanding high-speed rail across India

NEET aspirant found dead in Kanpur hostel

WhatsApp begins testing cross app messaging in Europe

PhysicsWallah and Sunstone launch ‘Samvedna’ to strengthen student mental wellness support
.avif&w=256&q=75)
Supreme Court rejects challenge to demolition of 200-year-old Ujjain mosque

SC asks NBE to clarify policy on publishing NEET-PG answer keys

5 women among nine family members get life for brutal 2013 murder of UP farmer
.webp&w=256&q=75)
PM Modi accuses RJD of grooming ‘Rangdaars’, says record turnout jolted opposition

5 women among nine family members get life for brutal 2013 murder of UP farmer
.webp&w=256&q=75)
PM Modi accuses RJD of grooming ‘Rangdaars’, says record turnout jolted opposition

PM Modi flags off four new Vande Bharat trains, expanding high-speed rail across India

NEET aspirant found dead in Kanpur hostel

WhatsApp begins testing cross app messaging in Europe
Copyright© educationpost.in 2024 All Rights Reserved.
Designed and Developed by @Pyndertech