Evaluation of DDOS Invasions

Authors

  • Mohammed Muzafar B.E. Student, Department of IT, Lords Institute of Engineering and Technology, Hyderabad Author
  • Syed Rezwan B.E. Student, Department of IT, Lords Institute of Engineering and Technology, Hyderabad Author
  • Abdullah Ghouri B.E. Student, Department of IT, Lords Institute of Engineering and Technology, Hyderabad Author
  • Mr. Syed Juber Assistant Professor, Department of IT, Lords Institute of Engineering and Technology, Hyderabad Author

DOI:

https://doi.org/10.62647/

Keywords:

A type of cyberattack where an attacker overwhelms a computer system, network, or website with a flood of traffic. Attack where multiple compromised devices are used to launch a coordinated attack. The practice of protecting computer systems, networks, and sensitive information from unauthorized access, use, disclosure, disruption, modification, or destruction.

Abstract

Cloud service availability has been one of
the major concerns of cloud service
providers (CSP), while hosting different
cloud based information technology
services by managing different resources
on the internet. The vulnerability of
internet, the distribute nature of cloud
computing, various security issues
related to cloud computing service
models, and cloud’s main attributes
contribute to its susceptibility of security
threats associated with cloud service
availability. One of the major
sophisticated threats that happen to be
very difficult and challenging to counter
due to its distributed nature and resulted
in cloud service disruption is Distributed
Denial of Service (DDoS) attacks. Even
though there are number of intrusion
detection solutions proposed by different
research groups, and cloud service
providers (CSP) are currently using
different detection solutions by promising
that their product is well secured, there is
no such a perfect solution that prevents
the DDoS attack. The characteristics of
DDoS attack, i.e., having different
appearance with different scenarios,
make it difficult to detect. This paper will
review and analyze different existing
DDoS detecting techniques against
different parameters, discusses their
advantage and disadvantages, and
propose a hybrid statistical model that
could significantly mitigate these attacks
and be a better alternative solution for
current detection problems.

Downloads

Download data is not yet available.

Downloads

Published

22-05-2025

How to Cite

Evaluation of DDOS Invasions. (2025). International Journal of Information Technology and Computer Engineering, 13(2), 1136-1141. https://doi.org/10.62647/