SlideShare a Scribd company logo
RESEARCH ON: DDos Attack Detection Using Entropy Method
Abstract:
The main achievement of our project would be to detect the DDoS attack; this will help to
differentiate between legitimate users and malicious users. On other hand our project provides a
trace back mechanism through which one can know from where the attacks are coming, through
which zombie computers. This document will define the design of the detection of DDoS attack
using Fast Entropy Method.
Among the various security threats that have evolved till now, Denial of Service attack is the
most destructive according to security experts. A Denial of service attack is basically used to
block any service for intended users. A Distributed Denial of Service attack generates substantial
packets by a large number of agents and can easily tire out the processing and communication
resources of a victim within very less period of time. Defending DDoS problem involved several
steps from detection, characterization and trace back in order to do mitigation.
The main purpose of this research paper is the detection of Distributed Denial of service attacks
using fast entropy method and different tools will be used to detect DDos attack for given data
set. The objective broken down into smaller categories to make our research effective and
reactive.
• Our first objective understands the subject in detail by going through previous papers and
methods used to detect DDos attack.
• Second objective is to choose the latest method used for DDos detection and start
working on it.
• Third objective is to choose tools that are requires to carry out implementation. Since
carrying out attack needs extra care when compared to simulation.
This project also demands proper ways to measure the attack when it is actually occurring.
Summing up the objective of our research would be to investigate and learn subject in depth,
implementing the DDos attacks, use method that detect that attack.

More Related Content

What's hot

Community Engagement Using NFC
Community Engagement Using NFCCommunity Engagement Using NFC
Community Engagement Using NFC
Christopher Jimenez
 
Attack lecture #2 ppt
Attack lecture #2 pptAttack lecture #2 ppt
Attack lecture #2 ppt
vasanthimuniasamy
 
Do s and d dos attacks at osi layers
Do s and d dos attacks at osi layersDo s and d dos attacks at osi layers
Do s and d dos attacks at osi layers
Hadeel Sadiq Obaid
 
Enhancement in network security with security protocols
Enhancement in network security with security protocolsEnhancement in network security with security protocols
Enhancement in network security with security protocols
eSAT Journals
 
Enhancement in network security with security
Enhancement in network security with securityEnhancement in network security with security
Enhancement in network security with security
eSAT Publishing House
 
Internet Identifier SSR
Internet Identifier SSRInternet Identifier SSR
Internet Identifier SSR
APNIC
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
Vivek Gandhi
 
Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Ne...
Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Ne...Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Ne...
Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Ne...
journalBEEI
 
Telesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting InfographicTelesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting Infographic
Sarah Chandley
 
Network forensics - Follow the Bad Rabbit down the wire
Network forensics - Follow the Bad Rabbit down the wireNetwork forensics - Follow the Bad Rabbit down the wire
Network forensics - Follow the Bad Rabbit down the wire
casheeew
 
Cyber Threat Hunting: Identify and Hunt Down Intruders
Cyber Threat Hunting: Identify and Hunt Down IntrudersCyber Threat Hunting: Identify and Hunt Down Intruders
Cyber Threat Hunting: Identify and Hunt Down Intruders
Infosec
 
Cybercrime and data sharing
Cybercrime and data sharingCybercrime and data sharing
Cybercrime and data sharing
blogzilla
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
Dr. Kapil Gupta
 
Survey Paper: Cryptography Is The Science Of Information Security
Survey Paper: Cryptography Is The Science Of Information SecuritySurvey Paper: Cryptography Is The Science Of Information Security
Survey Paper: Cryptography Is The Science Of Information Security
CSCJournals
 

What's hot (14)

Community Engagement Using NFC
Community Engagement Using NFCCommunity Engagement Using NFC
Community Engagement Using NFC
 
Attack lecture #2 ppt
Attack lecture #2 pptAttack lecture #2 ppt
Attack lecture #2 ppt
 
Do s and d dos attacks at osi layers
Do s and d dos attacks at osi layersDo s and d dos attacks at osi layers
Do s and d dos attacks at osi layers
 
Enhancement in network security with security protocols
Enhancement in network security with security protocolsEnhancement in network security with security protocols
Enhancement in network security with security protocols
 
Enhancement in network security with security
Enhancement in network security with securityEnhancement in network security with security
Enhancement in network security with security
 
Internet Identifier SSR
Internet Identifier SSRInternet Identifier SSR
Internet Identifier SSR
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Ne...
Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Ne...Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Ne...
Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Ne...
 
Telesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting InfographicTelesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting Infographic
 
Network forensics - Follow the Bad Rabbit down the wire
Network forensics - Follow the Bad Rabbit down the wireNetwork forensics - Follow the Bad Rabbit down the wire
Network forensics - Follow the Bad Rabbit down the wire
 
Cyber Threat Hunting: Identify and Hunt Down Intruders
Cyber Threat Hunting: Identify and Hunt Down IntrudersCyber Threat Hunting: Identify and Hunt Down Intruders
Cyber Threat Hunting: Identify and Hunt Down Intruders
 
Cybercrime and data sharing
Cybercrime and data sharingCybercrime and data sharing
Cybercrime and data sharing
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
 
Survey Paper: Cryptography Is The Science Of Information Security
Survey Paper: Cryptography Is The Science Of Information SecuritySurvey Paper: Cryptography Is The Science Of Information Security
Survey Paper: Cryptography Is The Science Of Information Security
 

Viewers also liked

Wordpress-ке сайтқа материал салу
Wordpress-ке сайтқа материал салуWordpress-ке сайтқа материал салу
Wordpress-ке сайтқа материал салу
Айбек Қуандықұлы
 
Resesarch on SQA
Resesarch on SQAResesarch on SQA
Resesarch on SQAAisha Khan
 
L fleshler 360 strategy sample
L fleshler 360 strategy sampleL fleshler 360 strategy sample
L fleshler 360 strategy sampleLauren Fleshler
 
Crowdfunding als alternative bron van financiering
Crowdfunding als alternative bron van financieringCrowdfunding als alternative bron van financiering
Crowdfunding als alternative bron van financiering
Bolero Crowdfunding
 
KBCS Summit 2015_Panelgesprek olv Koen Hoffman
KBCS Summit 2015_Panelgesprek olv Koen HoffmanKBCS Summit 2015_Panelgesprek olv Koen Hoffman
KBCS Summit 2015_Panelgesprek olv Koen Hoffman
Bolero Crowdfunding
 
20160317內政部:「土壤液化潛勢資訊公開作業及配套措施」報告
20160317內政部:「土壤液化潛勢資訊公開作業及配套措施」報告20160317內政部:「土壤液化潛勢資訊公開作業及配套措施」報告
20160317內政部:「土壤液化潛勢資訊公開作業及配套措施」報告
R.O.C.Executive Yuan
 
Pres stiglitz
Pres stiglitzPres stiglitz
Pres stiglitz
Gina Castro
 
Mélanie Roche cours L1 Histoire et communication : L'imprimé au coeur de la R...
Mélanie Roche cours L1 Histoire et communication : L'imprimé au coeur de la R...Mélanie Roche cours L1 Histoire et communication : L'imprimé au coeur de la R...
Mélanie Roche cours L1 Histoire et communication : L'imprimé au coeur de la R...
Mélanie Roche
 

Viewers also liked (10)

Wordpress-ке сайтқа материал салу
Wordpress-ке сайтқа материал салуWordpress-ке сайтқа материал салу
Wordpress-ке сайтқа материал салу
 
Resesarch on SQA
Resesarch on SQAResesarch on SQA
Resesarch on SQA
 
CURRICULO BAS 2015
CURRICULO BAS 2015CURRICULO BAS 2015
CURRICULO BAS 2015
 
L fleshler 360 strategy sample
L fleshler 360 strategy sampleL fleshler 360 strategy sample
L fleshler 360 strategy sample
 
Crowdfunding als alternative bron van financiering
Crowdfunding als alternative bron van financieringCrowdfunding als alternative bron van financiering
Crowdfunding als alternative bron van financiering
 
KBCS Summit 2015_Panelgesprek olv Koen Hoffman
KBCS Summit 2015_Panelgesprek olv Koen HoffmanKBCS Summit 2015_Panelgesprek olv Koen Hoffman
KBCS Summit 2015_Panelgesprek olv Koen Hoffman
 
20160317內政部:「土壤液化潛勢資訊公開作業及配套措施」報告
20160317內政部:「土壤液化潛勢資訊公開作業及配套措施」報告20160317內政部:「土壤液化潛勢資訊公開作業及配套措施」報告
20160317內政部:「土壤液化潛勢資訊公開作業及配套措施」報告
 
Pres stiglitz
Pres stiglitzPres stiglitz
Pres stiglitz
 
RoyalLog.pptx ajuste1 (5).pptx - Monica
RoyalLog.pptx ajuste1 (5).pptx - MonicaRoyalLog.pptx ajuste1 (5).pptx - Monica
RoyalLog.pptx ajuste1 (5).pptx - Monica
 
Mélanie Roche cours L1 Histoire et communication : L'imprimé au coeur de la R...
Mélanie Roche cours L1 Histoire et communication : L'imprimé au coeur de la R...Mélanie Roche cours L1 Histoire et communication : L'imprimé au coeur de la R...
Mélanie Roche cours L1 Histoire et communication : L'imprimé au coeur de la R...
 

Similar to DDOS Detection

A Dynamic Bandwidth Assignment Approach Under DDoS Flood Attack
A Dynamic Bandwidth Assignment Approach Under DDoS Flood AttackA Dynamic Bandwidth Assignment Approach Under DDoS Flood Attack
A Dynamic Bandwidth Assignment Approach Under DDoS Flood Attack
Sara Alvarez
 
Defense mechanism for d do s attack through machine learning
Defense mechanism for d do s attack through machine learningDefense mechanism for d do s attack through machine learning
Defense mechanism for d do s attack through machine learning
eSAT Publishing House
 
Defense mechanism for ddos attack through machine learning
Defense mechanism for ddos attack through machine learningDefense mechanism for ddos attack through machine learning
Defense mechanism for ddos attack through machine learning
eSAT Journals
 
I034_I041_I052_DDOS Attacks_Presentation.pdf
I034_I041_I052_DDOS Attacks_Presentation.pdfI034_I041_I052_DDOS Attacks_Presentation.pdf
I034_I041_I052_DDOS Attacks_Presentation.pdf
Devesh Pawar
 
Denial of Service Attacks: The Complete Guide
Denial of Service Attacks: The Complete GuideDenial of Service Attacks: The Complete Guide
Denial of Service Attacks: The Complete Guide
Imperva
 
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUEA MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
IJNSA Journal
 
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUEA MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
IJNSA Journal
 
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUEA MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
IJNSA Journal
 
ITSecurity_DDOS_Mitigation
ITSecurity_DDOS_MitigationITSecurity_DDOS_Mitigation
ITSecurity_DDOS_MitigationR. Blake Martin
 
Hiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdf
Hiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdfHiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdf
Hiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdf
AnnaRose80
 
Study of flooding based ddos attacks and their effect using deter testbed
Study of flooding based ddos attacks and their effect using deter testbedStudy of flooding based ddos attacks and their effect using deter testbed
Study of flooding based ddos attacks and their effect using deter testbed
eSAT Journals
 
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
IJNSA Journal
 
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
IJNSA Journal
 
Em36849854
Em36849854Em36849854
Em36849854
IJERA Editor
 
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKSPASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
IJNSA Journal
 
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKSPASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
IJNSA Journal
 
Optimised malware detection in digital forensics
Optimised malware detection in digital forensicsOptimised malware detection in digital forensics
Optimised malware detection in digital forensics
IJNSA Journal
 
Network Threat Characterization in Multiple Intrusion Perspectives using Data...
Network Threat Characterization in Multiple Intrusion Perspectives using Data...Network Threat Characterization in Multiple Intrusion Perspectives using Data...
Network Threat Characterization in Multiple Intrusion Perspectives using Data...
IJNSA Journal
 
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
ijsptm
 
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
ClaraZara1
 

Similar to DDOS Detection (20)

A Dynamic Bandwidth Assignment Approach Under DDoS Flood Attack
A Dynamic Bandwidth Assignment Approach Under DDoS Flood AttackA Dynamic Bandwidth Assignment Approach Under DDoS Flood Attack
A Dynamic Bandwidth Assignment Approach Under DDoS Flood Attack
 
Defense mechanism for d do s attack through machine learning
Defense mechanism for d do s attack through machine learningDefense mechanism for d do s attack through machine learning
Defense mechanism for d do s attack through machine learning
 
Defense mechanism for ddos attack through machine learning
Defense mechanism for ddos attack through machine learningDefense mechanism for ddos attack through machine learning
Defense mechanism for ddos attack through machine learning
 
I034_I041_I052_DDOS Attacks_Presentation.pdf
I034_I041_I052_DDOS Attacks_Presentation.pdfI034_I041_I052_DDOS Attacks_Presentation.pdf
I034_I041_I052_DDOS Attacks_Presentation.pdf
 
Denial of Service Attacks: The Complete Guide
Denial of Service Attacks: The Complete GuideDenial of Service Attacks: The Complete Guide
Denial of Service Attacks: The Complete Guide
 
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUEA MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
 
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUEA MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
 
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUEA MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
 
ITSecurity_DDOS_Mitigation
ITSecurity_DDOS_MitigationITSecurity_DDOS_Mitigation
ITSecurity_DDOS_Mitigation
 
Hiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdf
Hiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdfHiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdf
Hiding_in_the_Crowd_Ransomware_Protection_by_Adopting_Camouflage.pdf
 
Study of flooding based ddos attacks and their effect using deter testbed
Study of flooding based ddos attacks and their effect using deter testbedStudy of flooding based ddos attacks and their effect using deter testbed
Study of flooding based ddos attacks and their effect using deter testbed
 
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
 
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
 
Em36849854
Em36849854Em36849854
Em36849854
 
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKSPASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
 
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKSPASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
 
Optimised malware detection in digital forensics
Optimised malware detection in digital forensicsOptimised malware detection in digital forensics
Optimised malware detection in digital forensics
 
Network Threat Characterization in Multiple Intrusion Perspectives using Data...
Network Threat Characterization in Multiple Intrusion Perspectives using Data...Network Threat Characterization in Multiple Intrusion Perspectives using Data...
Network Threat Characterization in Multiple Intrusion Perspectives using Data...
 
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
 
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
 

DDOS Detection

  • 1. RESEARCH ON: DDos Attack Detection Using Entropy Method Abstract: The main achievement of our project would be to detect the DDoS attack; this will help to differentiate between legitimate users and malicious users. On other hand our project provides a trace back mechanism through which one can know from where the attacks are coming, through which zombie computers. This document will define the design of the detection of DDoS attack using Fast Entropy Method. Among the various security threats that have evolved till now, Denial of Service attack is the most destructive according to security experts. A Denial of service attack is basically used to block any service for intended users. A Distributed Denial of Service attack generates substantial packets by a large number of agents and can easily tire out the processing and communication resources of a victim within very less period of time. Defending DDoS problem involved several steps from detection, characterization and trace back in order to do mitigation. The main purpose of this research paper is the detection of Distributed Denial of service attacks using fast entropy method and different tools will be used to detect DDos attack for given data set. The objective broken down into smaller categories to make our research effective and reactive. • Our first objective understands the subject in detail by going through previous papers and methods used to detect DDos attack. • Second objective is to choose the latest method used for DDos detection and start working on it. • Third objective is to choose tools that are requires to carry out implementation. Since carrying out attack needs extra care when compared to simulation. This project also demands proper ways to measure the attack when it is actually occurring. Summing up the objective of our research would be to investigate and learn subject in depth, implementing the DDos attacks, use method that detect that attack.