A distributed denial of service (DDoS) attack crippled Karnataka’s property registration portal Kaveri 2. 0 on Wednesday.
• Botnet Creation: Attackers infect multiple devices (computers, IoT devices, etc. ) with malware to form a botnet (network of compromised devices).
• Command & control: the attacker commands the botnet to execute an attack
• Traffic overload: the botnet floods the target system with so many requests that it uses all of its bandwidth, CPU, or memory
• Service disruption: the server is slow, crashes or becomes entirely unavailable to legitimate users
1. Volume-Based Attacks – Consume bandwidth to overwhelm the target.
• UDP Flood: Sends massive UDP packets to overload the system.
• ICMP Flood (Ping Flood): Floods the target with ICMP (ping) requests.
• DNS Amplification: Amplifies traffic toward the victim via open DNS resolvers.
2. Protocol Attacks - Exhaust server resources by exploiting weaknesses in network protocols.
• SYN Flood: Sends a lot of SYN (connection request) packets but does not complete the handshake.
• ACK Flood: Overloads the target with acknowledgment packets.
• Ping of Death: Sends large or badly formed packets to crash a system.
3. Application Layer Attacks – Target specific applications and services.
• HTTP Flood: Floods a web server with forged HTTP requests.
• Slowloris Attack - Opens many connections to a server but sends data slowly to consume resources
Also Read: Nano Rafts of DNA: Study of nature materials. Let know what it is!
• Website Downtime: Prevents users from accessing services.
• Financial Loss: Businesses suffer revenue loss due to unavailability.
• Reputation Damage: Customers lose trust in affected services.
• Legal Consequences – if user data is exposed or compliance policies are broken.
• To filter malicious traffic at your workspace, u se a Web Application Firewall (WAF
• Utilize Content Delivery Networks (CDNs) to distribute traffic load.
• Monitor Traffic Patterns to detect and block abnormal spikes.
• Employ DDoS Protection Services (Cloudflare, AWS Shield, Akamai, etc.).
CCTV backs survivor’s account in Kolkata law college rape case, SIT team expanded as probe deepens
Trump urges deal to end Gaza war as signs of progress emerge
Debate over addition of ‘socialist’ and ‘secular’ to Preamble intensifies following renewed opposition
Delhi to test artificial rain between July 4–11 to combat air pollution
Air India crash death toll finalized at 260; sabotage not ruled out, says aviation minister
CCTV backs survivor’s account in Kolkata law college rape case, SIT team expanded as probe deepens
Air India crash death toll finalized at 260; sabotage not ruled out, says aviation minister
PM Modi slams 1975 Emergency as assault on constitution and judiciary
Bengaluru businessman robbed of ₹2 crore during cash-to-crypto deal in broad daylight
BJP defends actor Diljit Dosanjh in ‘Sardaar Ji 3’ row, slams citizenship threat as ‘irrational and unjustified’
CCTV backs survivor’s account in Kolkata law college rape case, SIT team expanded as probe deepens
Trump urges deal to end Gaza war as signs of progress emerge
Debate over addition of ‘socialist’ and ‘secular’ to Preamble intensifies following renewed opposition
Delhi to test artificial rain between July 4–11 to combat air pollution
Air India crash death toll finalized at 260; sabotage not ruled out, says aviation minister
CCTV backs survivor’s account in Kolkata law college rape case, SIT team expanded as probe deepens
Air India crash death toll finalized at 260; sabotage not ruled out, says aviation minister
PM Modi slams 1975 Emergency as assault on constitution and judiciary
Bengaluru businessman robbed of ₹2 crore during cash-to-crypto deal in broad daylight
BJP defends actor Diljit Dosanjh in ‘Sardaar Ji 3’ row, slams citizenship threat as ‘irrational and unjustified’
Copyright© educationpost.in 2024 All Rights Reserved.
Designed and Developed by @Pyndertech