International Journal of Computer Engineering & Applications
Distributed Denial of Service (DDoS) attacks have become a large problem for users of computer systems connected to the Internet. DDoS attackers hijack secondary victim systems using them to wage a coordinated large-scale attack against primary victim systems. With little or no advance warning, a DDoS attack can easily exhaust the computing and communication resources of its victim within a short period of time. This paper attempts a comprehensive scoping of the DDoS problem for both Internet and non-internet. It highlights the existing and new taxonomies to categorize DDoS attack networks, to classify the different techniques used in a DDoS attack.