You are on page 1of 1

7.

CONCLUSION
, a denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users

A number of IP traceback approaches have been suggested to identify attackers , among them, the two major methods for IP traceback, includes the probabilistic packet marking (PPM) and the deterministic packet marking (DPM)[3] I studied a novel mechanism for IP trace back using information theoretical parameters, and there is no packet marking in the proposed strategy I therefore, can avoid the inherited shortcomings of the packet marking mechanisms DDoS attacks are targeted at exhausting the victims resources, such as network bandwidth, computing power, and operating system data structures. To launch a DDoS attack, the attackers first establishes a network of computers that will be used to generate the huge volume of traffic needed to deny services to legitimate users of the victim

You might also like