A Survey on Preventing distributed denial of service attacks and data security

Korrai Vamsi Krishna, K.Narayana Rao


Amid my exploration for this postulation ,In a DDoS assault, the assault utilizes generally dispersed zombies to send a lot of activity to the objective framework, subsequently keeping real clients from getting to organize assets. In the meantime, as of late here are expanding interests in utilizing way identifiers PIDs that distinguish ways between system elements as between area directing items, since doing this not just aides tending to the steering versatility and multi-way steering issues yet in addition can encourage the and reception of various steering structures. For example, Godfrey et al. proposed path let steering ,which systems publicize the PIDs of path throughout the Internet and a sender in the system develops its select path lets into a conclusion to-end source course.

Full Text:



  • There are currently no refbacks.

Copyright (c) 2018 Edupedia Publications Pvt Ltd

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.


EduPedia Publications Pvt Ltd, D-351, Prem Nagar-2, Suleman Nagar, Kirari, Nagloi, New Delhi PIN-Code 110086, India Through Phone Call us now: +919958037887 or +919557022047

All published Articles are Open Access at https://edupediapublications.org/journals/

Paper submission: editor@edupediapublications.com or edupediapublications@gmail.com

Editor-in-Chief       editor@edupediapublications.com

Mobile:                  +919557022047 & +919958037887

Websites   https://edupediapublications.org/journals/.

Journals Maintained and Hosted by

EduPedia Publications (P) Ltd in Association with Other Institutional Partners


Pen2Print and IJR are registered trademark of the Edupedia Publications Pvt Ltd.