Open Access Open Access  Restricted Access Subscription or Fee Access

A Survey on Detections and Preventions of IP Spoofed DoS/DDoS Attacks

Teslin Sabu


In the modern computer world, maintaining the information in remote host is very difficult. The main issue involved in using internet lies in its security. According to the latest studies the DoS attack is the most popular attack in networks security. A denial of service (DoS) attack is an attempt to make a machine or network or its resource unavailable to its intended users. DoS also compromise the availability of network services. Distributed denial of service (DDoS) is that attack that which originates from multiple distributed attackers. Also it differs from DoS in its execution. The idea called IP spoofing is used recently for the DDoS attacks that even include attacks on E-commerce. As internet grows without much security concerns one can exploit the weaknesses of the network to alter or break its normal working. In this paper, we present various IP spoofed DoS/DDoS attack detection and prevention methods.



Keywords: DoS, IP spoofing, DDoS, firewalls, cryptography, packet filtering, hop count filtering, round trip time (RTT), distributed probability HCF (DPHCF)


Cite this Article


Teslin Sabu, Sanam Anto. A Survey on Detections and Preventions of IP Spoofed DoS/DDoS Attacks. Current trends in Information Technology. 2016; 6(2): 1–4p.

Full Text:



  • There are currently no refbacks.