A distributed denial of service (DDoS) attack crippled Karnataka’s property registration portal Kaveri 2. 0 on Wednesday.

• Botnet Creation: Attackers infect multiple devices (computers, IoT devices, etc. ) with malware to form a botnet (network of compromised devices).
• Command & control: the attacker commands the botnet to execute an attack
• Traffic overload: the botnet floods the target system with so many requests that it uses all of its bandwidth, CPU, or memory
• Service disruption: the server is slow, crashes or becomes entirely unavailable to legitimate users
1. Volume-Based Attacks – Consume bandwidth to overwhelm the target.

• UDP Flood: Sends massive UDP packets to overload the system.
• ICMP Flood (Ping Flood): Floods the target with ICMP (ping) requests.
• DNS Amplification: Amplifies traffic toward the victim via open DNS resolvers.
2. Protocol Attacks - Exhaust server resources by exploiting weaknesses in network protocols.
• SYN Flood: Sends a lot of SYN (connection request) packets but does not complete the handshake.
• ACK Flood: Overloads the target with acknowledgment packets.
• Ping of Death: Sends large or badly formed packets to crash a system.
3. Application Layer Attacks – Target specific applications and services.
• HTTP Flood: Floods a web server with forged HTTP requests.
• Slowloris Attack - Opens many connections to a server but sends data slowly to consume resources
Also Read: Nano Rafts of DNA: Study of nature materials. Let know what it is!
• Website Downtime: Prevents users from accessing services.
• Financial Loss: Businesses suffer revenue loss due to unavailability.
• Reputation Damage: Customers lose trust in affected services.
• Legal Consequences – if user data is exposed or compliance policies are broken.
• To filter malicious traffic at your workspace, u se a Web Application Firewall (WAF
• Utilize Content Delivery Networks (CDNs) to distribute traffic load.
• Monitor Traffic Patterns to detect and block abnormal spikes.
• Employ DDoS Protection Services (Cloudflare, AWS Shield, Akamai, etc.).

MSDE, Google Cloud, and CCSU launch AI-enabled university pilot in India

IIT Madras hosts international conference on water, food, and waste systems
%20Preeti%20Lobana%2C%20Sh.%20Jayant%20Chaudhary%2C%20Chris%20Phillips.jpeg&w=256&q=75)
Google launches new AI initiatives to transform learning in India

UIDAI rolls out new Aadhaar app for privacy-first age verification

Eruditus partners with seven global universities to set up India campuses

UIDAI rolls out new Aadhaar app for privacy-first age verification

SC puts 2026 UGC equity rules on hold, flags ‘vague’ caste bias definition

‘Oh s***’: Crew’s final words before Ajit Pawar’s jet went down in Baramati

Rupee sinks to record low near ₹92 per dollar despite strong growth signals

Two mid-day meal cooks die as wage hike protest escalates in Chhattisgarh

MSDE, Google Cloud, and CCSU launch AI-enabled university pilot in India

IIT Madras hosts international conference on water, food, and waste systems
%20Preeti%20Lobana%2C%20Sh.%20Jayant%20Chaudhary%2C%20Chris%20Phillips.jpeg&w=256&q=75)
Google launches new AI initiatives to transform learning in India

UIDAI rolls out new Aadhaar app for privacy-first age verification

Eruditus partners with seven global universities to set up India campuses

UIDAI rolls out new Aadhaar app for privacy-first age verification

SC puts 2026 UGC equity rules on hold, flags ‘vague’ caste bias definition

‘Oh s***’: Crew’s final words before Ajit Pawar’s jet went down in Baramati

Rupee sinks to record low near ₹92 per dollar despite strong growth signals

Two mid-day meal cooks die as wage hike protest escalates in Chhattisgarh
Copyright© educationpost.in 2024 All Rights Reserved.
Designed and Developed by @Pyndertech