International Journal of Computer Applications
Now-a-days, secured information communication has becoming at risk. Millions of users using the internet at any instant of time and taking full use of the application's, services. DDoS flooding attacks are complex attempts to block the legitimate users. The attacker normally gains access to a large number of computers by breaching their security loopholes and then they launch their attack to the target machine by these compromised machines. Intrusion Detection Systems (IDS) have gained quick growth in command, scope and complexity.