A distributed denial of service (DDoS) attack crippled Karnataka’s property registration portal Kaveri 2. 0 on Wednesday.
• Botnet Creation: Attackers infect multiple devices (computers, IoT devices, etc. ) with malware to form a botnet (network of compromised devices).
• Command & control: the attacker commands the botnet to execute an attack
• Traffic overload: the botnet floods the target system with so many requests that it uses all of its bandwidth, CPU, or memory
• Service disruption: the server is slow, crashes or becomes entirely unavailable to legitimate users
1. Volume-Based Attacks – Consume bandwidth to overwhelm the target.
• UDP Flood: Sends massive UDP packets to overload the system.
• ICMP Flood (Ping Flood): Floods the target with ICMP (ping) requests.
• DNS Amplification: Amplifies traffic toward the victim via open DNS resolvers.
2. Protocol Attacks - Exhaust server resources by exploiting weaknesses in network protocols.
• SYN Flood: Sends a lot of SYN (connection request) packets but does not complete the handshake.
• ACK Flood: Overloads the target with acknowledgment packets.
• Ping of Death: Sends large or badly formed packets to crash a system.
3. Application Layer Attacks – Target specific applications and services.
• HTTP Flood: Floods a web server with forged HTTP requests.
• Slowloris Attack - Opens many connections to a server but sends data slowly to consume resources
Also Read: Nano Rafts of DNA: Study of nature materials. Let know what it is!
• Website Downtime: Prevents users from accessing services.
• Financial Loss: Businesses suffer revenue loss due to unavailability.
• Reputation Damage: Customers lose trust in affected services.
• Legal Consequences – if user data is exposed or compliance policies are broken.
• To filter malicious traffic at your workspace, u se a Web Application Firewall (WAF
• Utilize Content Delivery Networks (CDNs) to distribute traffic load.
• Monitor Traffic Patterns to detect and block abnormal spikes.
• Employ DDoS Protection Services (Cloudflare, AWS Shield, Akamai, etc.).
Lucknow University offers free education to families of Pahalgam terror victims
Twenty Red-Crowned Roofed Turtles (Batagur kachuga), which are critically endangered, have been successfully reintroduced into the Ganga River
The 52nd Chief Justice of India (CJI) is Justice Bhushan Ramkrishna Gavai
Amazon successfully deployed the initial 27 satellites of Project Kuiper using the Atlas V rocket from Cape Canaveral, USA.
India has entered into agreements to provide 412,000 tonnes of green hydrogen derivatives to Japan and Singapore
Pakistan warns of imminent Indian strike, cites 'credible intelligence'
PM Modi grants armed forces full autonomy to respond to Pahalgam attack
Pakistan breaches LoC ceasefire again, India hits back with force
SC defends use of spyware for national security, says privacy not absolute
Breaking the myth: Do only busy parents send their kids to boarding schools?
Lucknow University offers free education to families of Pahalgam terror victims
Twenty Red-Crowned Roofed Turtles (Batagur kachuga), which are critically endangered, have been successfully reintroduced into the Ganga River
The 52nd Chief Justice of India (CJI) is Justice Bhushan Ramkrishna Gavai
Amazon successfully deployed the initial 27 satellites of Project Kuiper using the Atlas V rocket from Cape Canaveral, USA.
India has entered into agreements to provide 412,000 tonnes of green hydrogen derivatives to Japan and Singapore
Pakistan warns of imminent Indian strike, cites 'credible intelligence'
PM Modi grants armed forces full autonomy to respond to Pahalgam attack
Pakistan breaches LoC ceasefire again, India hits back with force
SC defends use of spyware for national security, says privacy not absolute
Breaking the myth: Do only busy parents send their kids to boarding schools?
Copyright© educationpost.in 2024 All Rights Reserved.
Designed and Developed by @Pyndertech