[Valid RSS]
March 20, 2023, 12:39 am
GIZ Bangladesh’s training held on SDG localisation in Khulna ছোটদের সহজ প্রোগ্রামিং শিক্ষায় প্রকাশিত হল বাংলা স্ক্র্যাচ বই Ditching Russian gas no way to reach climate goals : Putin চট্টগ্রামে নিরাপদ খাদ্য বিষয়ে প্রচারনা কর্মসূচি সমাপ্ত Samsung brings month-long smartphone campaign On September 6–7, Vladimir Putin will make working trip to Vladivostok Two Russian embassy workers killed in ‘suicide bombing’ Shocked & devastated by the horrific attacks : Justin Trudeau  SSC, equivalent exams begin Sept 15: Dipu Moni Ten killed in Canadian stabbing spree Russia wants UN to pressure US : media Daraz Bangladesh Anniversary Campaign – Now LIVE! realme offers upto BDT 3400 off on occasion of Daraz’s 8th anniversary General Pharmaceuticals employees will receive insurance from MetLife চট্টগ্রামের কলেজিয়েট স্কুলে নিরাপদ খাদ্য বিষয়ে প্রচারনা কর্মসূচি শুরু Bangladesh a secular country, immediate action is taken whenever minorities are attacked: PM  Two more mortar shells from Myanmar land in Bangladesh OPPO launches killer device A57 in 15-20K price range ShareTrip and Grameenphone join hands to offer exciting travel privileges ড্যাপ ২০২২-২০৩৫ এর পরিপূর্ণ বাস্তবায়নের দাবী বিআইপির

Govt alerts IT infrastructures, key offices over DDoS cyber attack

Bangladesh Beyond
  • Updated on Saturday, August 20, 2022
  • 272 Impressed

Govt alerts IT infrastructures, key offices over DDoS cyber attack


DHAKA, Aug 20, 2022 (BSS) –


All important organisations including information technology (IT) infrastructures have been asked to take proper measures as the government’s computer incident response team in its regular surveillance noticed distributed denial-of-service (DDoS) cyber attacks very recently in Bangladesh.

The government’s computer incident response team (BGD e-GOV CIRT) of Bangladesh Computer Council under Information and Communication Technology (ICT) Division made the call in a press release here today. 
In computing, a denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network.

In the DDoS cyber attack, use of different types of internet packets including TCP Push Flood, UDP Flood, TCP RST flood, TCP SYN Flood, TCP Window Size flood, IP fragment flood were noticed.

Under the circumstances, all important information infrastructures have been recommended to set limit of anti-DDoS protection threshold after updating or setting anti-DDoS hardware and software following digital security guidelines to keep safe all IT infrastructures.



How does a DDoS attack work?

DDoS attacks are carried out with networks of Internet-connected machines, according to global network Cloudflare.

These networks consist of computers and other devices (such as IoT devices)which have been infected with malware, allowing them to be controlled remotely by an attacker. These individual devices are referred to as bots (or zombies), and a group of bots is called a botnet.

Once a botnet has been established, the attacker is able to direct an attack by sending remote instructions to each bot.

When a victim’s server or network is targeted by the botnet, each bot sends requests to the target’s IP address, potentially causing the server or network to become overwhelmed, resulting in a denial-of-service to normal traffic.
Because each bot is a legitimate Internet device, separating the attack traffic from normal traffic can be difficult.


Read us@googlenews



More News
© Copyright: 2020-2022

Bangladesh Beyond is an online version of Fortnightly Apon Bichitra 

(Reg no: DA 1825)

Developed By Bangladesh Beyond