A distributed denial-of-service (DDoS) attack occurs when multiple machines are operating together to attack one target. DDoS attackers often leverage the use of a botnet—a group of hijacked internet connected devices to carry out large-scale attacks. Attackers take advantage of security vulnerabilities or device weaknesses to control numerous devices using command and control software. Once in control, an attacker can command their botnet to conduct DDoS on a target. In this case, the infected devices are also victims of the attack. There are many different methods for carrying out a DoS attack. It typically falls in 2 categories:
Buffer overflow attacks
An attack type in which a memory buffer overflow can cause a machine to consume all available hard disk space, memory, or CPU time. It results in sluggish behavior, system crashes, resulting in denial-of-service.
Flood attack
By the overwhelming amount of packets, a malicious attacker is able to overflows server capacity, resulting in denial-of-service. In order for most DoS flood attacks to be successful, the malicious attacker must have more available bandwidth than the target.
How to prevent DOS attack
1) Install a firewall and configure it to restrict traffic coming into and leaving your computer.
2) Install antivirus software.
3) Evaluate security settings and follow good security practices.
4) Use a DoS protection service that detects malicious traffic flows and redirects traffic away from your network.
DoS attack cases in India
In March 2019, The official website of the Bharatiya Janata Party (BJP) came under the attack of a distributed denial-ofservice (DDoS) which is a malicious attempt to disrupt normal traffic of a targeted server, service, or network by overwhelming the target with a flood of internet traffic