Main Article Content
Distributed Denial of Service (DDOS) attacks continue to escalate in size and impact despite efforts to control and limit exposures that enable them to be successful. The combining separate existing information technologies in a collaborative system. Devices used to gather evidence on attack methods and provide for reverse engineering malware are ‘honey pots’.Intrusion prevention systems (IPS) can take action to alert administrators to potential misuse of computing assets and in many cases execute predetermined response to malicious activity Denial of Service (DDOS) attack, which aims to make a service unavailable to legitimate clients, has become a severe threat to the Internet security. Traditional DDOS attacks mainly abuse the network bandwidth around the Internet subsystems and degrade the quality of service by generating congestions at the network. Consequently, several network-based defense methods have tried to detect these attacks by controlling traffic volume or differentiating traffic patterns at the intermediate routers .However, with the boost in network bandwidth and application service types, recently, the target of DDOS attacks has shifted from network to server resources and application procedures themselves, forming a new application DDOS attack.