International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)
Tracing DoS attack that employ source address spoofing is an important and challenging problem. It is important to protect the resource and trace from the Distributed Denial of Service (DDoS) attack, but it is difficult to distinguish normal traffic and DoS attack traffic because the DoS generally hide their identities/origins. Especially the attackers often use incorrect or spoofed source IP address, so tracing the source of the denial of service is hardest in internet. So many techniques and methodologies are used to trace the DDoS attacks.