
UPSC Science Technology UPSC UPSC UPSC UPSC Upsc Upsc Upsc Upsc UPSC BPSC MPPSC UPPSC CAPF CDS NDA™
February 28, 2025 at 01:58 AM
🔆Current Context: A DDoS attack crippled the Kaveri 2.0 portal, used for property registrations in Karnataka, highlighting the vulnerability of online services to cyberattacks.
📍DDoS Attack on Kaveri 2.0:
✅Impact: Sporadic server outages in January, significant registration fall on Feb 1 & 4.
✅Cause: Malicious DDoS attack using automated tools/bots.
✅Investigation: Cybercrime police registered a case under IT Act 2000.
✅Details: Fake accounts created, entries made to database, overwhelming system. 62 email accounts from 14 IP addresses.
✅Specific Event: 6.2 lakh requests in 2 hours for Encumbrance Certificate searches using random keywords.
📍What is a DDoS Attack?
✅Disruption: Malicious attempt to disrupt normal functioning of a server/service.
✅Mechanism: Overwhelming target with internet traffic from multiple compromised systems (botnet).
✅Difference from DoS: DoS uses single source, DDoS uses multiple sources.
✅Potential Damage: Service downtime, revenue loss, reputational damage, distraction for other cyberattacks.
📍Mitigation Measures:
✅Traffic Filtering: Advanced mechanisms to distinguish legitimate and malicious traffic.
✅Monitoring Tools: Identify unusual traffic patterns and take pre-emptive actions.
✅Rate Limiting: Control requests a user can make in a given time frame.
✅Bot Detection: CAPTCHA, behavioral analysis to block automated tools.
✅Authentication: Robust mechanisms, regular security audits.
✅Collaboration: Work with cybersecurity agencies, share information.
✅Dedicated Team: Monitor and respond to security incidents.
✅User Awareness: Educate on phishing and social engineering attacks.
📍Other Notable DDoS Attacks:
✅X (formerly Twitter): Massive DDoS attack in August 2024, causing delays and disruptions.
✅GitHub (2015): China-based botnet targeted projects circumventing Chinese censorship.
Possible Questions:
✅Prelims: Which of the following is/are a characteristic(s) of a DDoS attack?
It uses a single source to flood a target with traffic.
It involves multiple compromised systems (botnet).
It can lead to service downtime and revenue loss.
(a) 1 only
(b) 2 and 3 only
(c) 1 and 3 only
(d) 1, 2 and 3
✅Mains: "The increasing frequency and sophistication of DDoS attacks pose a significant threat to the digital infrastructure of governments and businesses." Discuss this statement, highlighting the vulnerabilities exposed by the Kaveri 2.0 incident and suggesting a comprehensive strategy for strengthening cybersecurity in India.

😂
1