Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

DDoS Simulation and Hybrid DDoS Defense Mechanism

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Saket Acharya, Nitesh Pradhan

Saket Acharya and Nitesh Pradhan. DDoS Simulation and Hybrid DDoS Defense Mechanism. International Journal of Computer Applications 163(9):20-24, April 2017. BibTeX

	author = {Saket Acharya and Nitesh Pradhan},
	title = {DDoS Simulation and Hybrid DDoS Defense Mechanism},
	journal = {International Journal of Computer Applications},
	issue_date = {April 2017},
	volume = {163},
	number = {9},
	month = {Apr},
	year = {2017},
	issn = {0975-8887},
	pages = {20-24},
	numpages = {5},
	url = {},
	doi = {10.5120/ijca2017913736},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


In cyberworld, resource accessibility has a key part in digital security alongside confidentiality and trustworthiness. Distributed Denial of Service (DDoS) attack has turned into an intriguing issue to the availability of assets in computer networks. In this paper, DDoS attacks at different layers of TCP/IP protocol are scrutinized and comparison of existing GUI DDoS tools with a distinct DDoS script is done so as to know the trend of attacking technique used by the assailants to perform an attack.Various defense tools are analyzed and comparison of existing defense mechanism with a distinct hybrid protection methodology is done. This paper aims to provide a superior comprehension of the current DDoS tools, protective mechanisms,and comparative analysis of them.Existing deficiencies in tools and defensive tecniques are examined and reduced to improve the efficiency.


  1. Christos Douligeris,Aikaterini Mitrokotsa. 2003 DDoS attacks and defense mechanisms: classification and state-of-the-art Signal Processing and Information Technology 3rd IEEE International Conference,pp-190-193.
  2. Khan Zeb, Owais Baig, Muhammad Kamran Asif 2015 DDOS Attacks and Countermeasures in Cyber SpaceWeb Applications and Networking (WSWAN), 2015 2nd World Conference IEEE,pp-1-6.
  3. Bharti Nagpal,Pratima Sharma,Naresh Chauhan,Angel Panesar. 2015 DDoS Tools: Classification, Analysis and Comparison, Computing for Sustainable Global Development (INDIACom), 2015 2nd International Conference IEEE ,pp. 342-346.
  4. Forman, G. 2003. An extensive empirical study of feature selection metrics for text classification. J. Mach. Learn. Res. 3 (Mar. 2003), 1289-1305.
  5. Udaya Kiran Tupakula ,Vijay Varadharajan, Srini Rao Pandalaneni. 2009 DoSTRACK: a system for defending against DoS attacks, ACM Digital Library, pp. 47-53, ISBN: 978-1-60558-166-8.
  6. Mohammed Alenezi, Martin J Reed.2012 Methodologies for detecting DoS/DDoS attacks against network servers, IEEE Journal Of Computing,Volume 45,Issue 1,pp. 1-10
  7. Abdulaziz Aborujilah,Shahrulniza Musa. 2014 Detecting TCP SYN based Flooding Attacks by Analyzing CPU and Network Resources Performance, IEEE Journal Of Computer Security ,Volume 16 ,Issue 3,pp. 3-10.
  8. Vyas Sekar ,Ravishankar Krishnaswamy, Anupam Gupta, Michael K. Reiter. 2010 “Network-wide deployment of intrusion detection and prevention systems”, ACM Digital Library, ISBN: 978-1-4503-0448-1
  9. Iyatiti Mokube, Michele Adams. 2005 Honeypots: concepts, approaches, and challenges, ACM Digital Library, ISBN: 978-1-59593-629-5.
  10. Archana S. Pimpalkar ,A. R. Bhagat Patil 2015 Detection and defense mechanisms against DDoS attacks: A review, IEEE Conference , ISBN: 978-1-4799-6818-3.


Cyber-attack, Cyber security,DDoS Attack,DDoS Attack Tools,Vulnerability,Mitigation