TY - JOUR AU - K.Munivara Prasad, PY - 2014/05/15 Y2 - 2024/03/29 TI - DoS and DDoS Attacks: Defense, Detection and Traceback Mechanisms - A Survey JF - Global Journal of Computer Science and Technology JA - GJCST VL - 14 IS - E7 SE - Articles DO - UR - https://computerresearch.org/index.php/computer/article/view/1081 SP - 15-32 AB - Denial of Service (DoS) or Distributed Denial of Service (DDoS) attacks are typically explicit attempts to exhaust victim2019;s bandwidth or disrupt legitimate users2019; access to services. Traditional architecture of internet is vulnerable to DDoS attacks and it provides an opportunity to an attacker to gain access to a large number of compromised computers by exploiting their vulnerabilities to set up attack networks or Botnets. Once attack network or Botnet has been set up, an attacker invokes a large-scale, coordinated attack against one or more targets. Asa result of the continuous evolution of new attacks and ever-increasing range of vulnerable hosts on the internet, many DDoS attack Detection, Prevention and Traceback mechanisms have been proposed, In this paper, we tend to surveyed different types of attacks and techniques of DDoS attacks and their countermeasures. The significance of this paper is that the coverage of many aspects of countering DDoS attacks including detection, defence and mitigation, traceback approaches, open issues and research challenges. ER -