4
Distributed Denial of Service Using I-DFT
Authors: Zaheeruddin, Shambhu Kumar Suman and N.K. Mittal
Number of views: 477
ABSTRACT : With the rapid development of information technology, internet has affect the people in all aspects
such as public utilities, telecommunication, financial transaction and defense system, all depends on information
technology and their security. The widespread deployment of new technologies had maximized the use of internet
to a great extent. But at the same time, the potential attackers are success on discovering new ways to attack.
Botnet is one of the most serious emerging threats and it refers to a number of compromised computers within
a network. Malicious activities which are performed by a botnet are DDoS, spam, click fraud, phishing, identity
theft, sniffing traffic, keylogging etc.
DDoS attack can significantly degrade the performance of a network or can completely disconnect a machine to
achieve resource overloading. The objective of this dissertation is dealing with DDoS attack. This work is
dividing into three phase. In first phase, we are simulating a botnet environment. In second phase, we are
performing UDP flooding of DDoS attack. In third we are applying queuing theory to overcome the DDoS attack.