PRELIMS BITS – INTERNAL SECURITY
Context:
Karnataka’s property registration portal, Kaveri 2.0, experienced major disruptions due to a Distributed Denial of Service (DDoS) attack, severely affecting its operations.
Understanding DDoS Attacks:
What is a DDoS Attack?
A Distributed Denial of Service (DDoS) attack overwhelms a server or network with an excessive volume of traffic, leading to service interruptions. This is carried out using a botnet—a collection of compromised devices—that generates an overwhelming number of requests to the targeted system.
How Does a DDoS Attack Function?
- Botnet Creation: Cybercriminals infect multiple devices with malware, turning them into bots.
- Traffic Surge: The botnet directs a flood of fake requests to the target system, consuming bandwidth and processing capacity.
- Service Disruption: Legitimate users experience significant delays or a complete service outage.
- Diversion Strategy: Attackers may use DDoS as a distraction while executing data breaches or malware infiltration.
Mitigation Strategies for DDoS Attacks:
- Traffic Filtering: Deploy AI-driven monitoring tools to detect and block malicious traffic.
- Rate Limiting: Restrict the number of requests per user to prevent system overload.
- Bot Detection Mechanisms: Implement CAPTCHA and behavioral analysis to identify and block automated attacks.
- Enhanced Authentication: Strengthen login security measures to prevent unauthorized access.
- Incident Response Teams: Maintain dedicated cybersecurity teams for real-time threat monitoring and mitigation.