International Journal of Engineering Research and Development (IJERD)
Distributed Denial of Service (DDoS) Attacks became a massive threat to the Internet. Traditional Architecture of internet is vulnerable to the attacks like DDoS. Attacker primarily acquire the people's army of Zombies, then that army will be instructed by the Attacker that when to start an attack and on whom the attack should be done. In this paper, different techniques which are used to perform DDoS Attacks, Tools that were used to perform Attacks and Countermeasures in order to detect the attackers and eliminate the Bandwidth Distributed Denial of Service attacks (B-DDoS) are reviewed.