ISSN:2582-5208

www.irjmets.com

Paper Key : IRJ************148
Author: Neetu Bala,Gurjit Kaur
Date Published: 01 Aug 2022
Abstract
Websites can be typical if they are often accessed by a lot of people or if they offer some helpful information. Once many people have access to it, the servers are frequently overloaded, which might result in an attack. The rapid advancement of technology has resulted in an increase in hacking cases. Threats of all shapes and sizes emerge daily with the intent of blocking user access to services. The quantity of traffic a DDoS assault sends to the host system per second can be used to identify it. For example, modest attacks may only send a few megabits (Mpbs), whereas massive attacks may send a terabit per second (Tbps). Attackers employ the botnet for high-volume attacks in order to carry them out effectively. If it happens infrequently, the server won't reply to the authorized user. Network administrators use this tool to protect internet devices from attack by comparing and recording incoming packet traffic with traffic signatures.
Paper File to download :