International Journal of Engineering Associates
Distributed Denial of Service (DDoS) attacks can be so powerful that they can easily deplete the computing resources or bandwidth of the potential targets. In network-based applications commonly provide some open ports for communication which makes them vulnerable to Distributed Denial of Service (DDoS) attacks. Adversaries that have the ability of eavesdropping messages exchanged by the application can identify open ports and launch directed attacks to those ports. It can just flood packets to keep the server busy with processing packets or cause congestion in the victim's network, so that the server might not have the ability to handle the packets from legitimate hosts or even cannot receive packets from them.