Unveiling the Evolving Threat Landscape of Distributed Denial-of-Service (DDoS) Attacks Methodology and Security Measures
Journal of Engineering Research and Sciences, Volume 4, Issue 10, Page # 9-20, 2025; DOI: 10.55708/js0410002
Keywords: DDoS, Cybersecurity, Countermeasures, Protection Techniques, Mitigation Strategies
(This article belongs to the Special Issue on SP7 (Special Issue on Multidisciplinary Sciences and Advanced Technology (SI-MSAT 2025)) and the Section Information Systems – Computer Science (ISC))
Export Citations
Cite
Eyadat, E. , Eyadat, M. and Alfaqih, A. (2025). Unveiling the Evolving Threat Landscape of Distributed Denial-of-Service (DDoS) Attacks Methodology and Security Measures. Journal of Engineering Research and Sciences, 4(10), 9–20. https://doi.org/10.55708/js0410002
Eman Eyadat, Mohammad Eyadat and Abedalrahman Alfaqih. "Unveiling the Evolving Threat Landscape of Distributed Denial-of-Service (DDoS) Attacks Methodology and Security Measures." Journal of Engineering Research and Sciences 4, no. 10 (October 2025): 9–20. https://doi.org/10.55708/js0410002
E. Eyadat, M. Eyadat and A. Alfaqih, "Unveiling the Evolving Threat Landscape of Distributed Denial-of-Service (DDoS) Attacks Methodology and Security Measures," Journal of Engineering Research and Sciences, vol. 4, no. 10, pp. 9–20, Oct. 2025, doi: 10.55708/js0410002.
This paper proposes a concrete severity classification framework and an evaluation lens for DDoS defenses (not a descriptive survey) and contributes two specific advancements. First, it introduces a quartile-based severity classification framework for Distributed Denial of Service (DDoS) attacks that extends beyond conventional binary detection. The framework classifies observed traffic into four categories (Q1–Q4) using thresholds derived from packet length, packet rate, and estimated bandwidth consumption. This multi-dimensional approach provides a clearer picture of attack intensity, enabling proportional defensive responses. Second, the paper provides a comparative evaluation of mitigation strategies deployed at different levels of the network, including victim side, source side, core router based, and distributed mechanisms. Each is assessed against a consistent set of technical metrics, highlighting strengths, limitations, and tradeoffs that are essential for operational decision making. Together, these contributions move the work beyond description into a methodological and evaluative framework. Future research directions include adaptive threshold tuning in real time environments, integration of the classification scheme into programmable network infrastructures, and automated mapping of severity levels to specific mitigation playbooks in cloud and edge computing contexts.
- Ahmad, S. Verma, N. Kumar, and J. Shekhar, “Classification of Internet security attacks,” in Proceedings of the 5th National Conference INDIACom-2011, Bharti Vidyapeeth’s Institute of Computer Applications and Management, New Delhi, 2011, ISBN: 978-93-80544-00-7.
- Yaegashi, D. Hisano, and Y. Nakayama, “Light-weight DDoS mitigation at network edge with limited resources,” in IEEE 18th Annual Consumer Communications & Networking Conference (CCNC), pp. 1–6, IEEE, 2021, doi: 10.1109/CCNC49033.2021.9415553.
- Yan and F. R. Yu, “Distributed denial of service attacks in software-defined networking with cloud computing,” IEEE Communications Magazine, vol. 53, no. 4, pp. 52–59, 2015, doi: 10.1109/mcom.2015.7081075.
- S. Mangrulkar, A. R. B. Patil, and A. S. Pande, “Network attacks and their detection mechanisms: A review,” International Journal of Computer Applications, vol. 90, no. 9, pp. 36-39, 2014, doi: 10.5120/15606-3154.
- Wang and R. Sun, “An IP-traceback-based packet filtering scheme for eliminating DDoS attacks,” Journal of Networks, vol. 9, no. 4, pp. 874–880, 2014, doi: 10.4304/jnw.9.4.874-881.
- Dzurenda, Z. Martinasek, and L. Malina, “Network protection against DDoS attacks,” International Journal of Advances in Telecommunications, Electrotechnics, Signals and Systems, vol. 4, no. 1, pp. 8–14, 2015.
- Pareek, A. Gautam, and R. Dey, “Different type network security threats and solutions: a review,” International Journal of Computer Science, vol. 5, no. 4, 2017, doi: 10.5430/ijcs.v5n4p46.
- Dayanandam, T. V. Rao, D. B. Babu, and S. N. Durga, “DDoS attacks—analysis and prevention,” in Innovations in Computer Science and Engineering: Proceedings of the Fifth ICICSE 2017, Springer Singapore, pp. 1–10, 2019, doi: 10.1007/978-981-13-3347-4_1.
- D. Bojović, I. Bašičević, S. Ocovaj, and M. Popović, “A practical approach to detection of distributed denial-of-service attacks using a hybrid detection method,” Computers & Electrical Engineering, vol. 73, pp. 84–96, 2019. Doi: 10.1016/j.compeleceng.2018.11.004.
- Chasaki, Q. Wu, and T. Wolf, “Attacks on network infrastructure,” in Proceedings of the 20th International Conference on Computer Communications and Networks (ICCCN), IEEE, pp. 1–8, 2011, doi:10.1109/ICCCN.2011.6005919.
- Chen and Q. Song, “Perimeter-based defense against high bandwidth DDoS attacks,” IEEE Transactions on Parallel and Distributed Systems, vol. 16, no. 6, pp. 526–537, 2005, doi: 10.1109/TPDS.2005.74.
- L. Dalmazo, J. A. Marques, L. R. Costa, M. S. Bonfim, R. N. Carvalho, A. S. da Silva, and W. Cordeiro, “A systematic review on distributed denial of service attack defense mechanisms in programmable networks,” International Journal of Network Management, vol. 31, no. 6, e2163, 2021. doi:: 10.1002/nem.2163.
- Douligeris and A. Mitrokotsa, “DDoS attacks and defense mechanisms: classification and state-of-the-art,” Computer Networks, vol. 44, no. 5, pp. 643–666, 2004, doi: 10.1109/ISSPIT.2003.134109.
- Furdek, L. Wosinska, R. Goścień, K. Manousakis, M. Aibin, K. Walkowiak, and J. L. Marzo, “An overview of security challenges in communication networks,” in Proceedings of the 8th International Workshop on Resilient Networks Design and Modeling (RNDM), IEEE, pp. 43–50, 2016, doi:10.1109/RNDM.2016.7608266.
- D. Kotey, E. T. Tchao, and J. D. Gadze, “On distributed denial of service current defense schemes,” Technologies, vol. 7, no. 1, pp. 1–19, 2019, doi: 10.3390/technologies7010019.
- T. Manavi, “Defense mechanisms against distributed denial of service attacks: A survey,” Computers & Electrical Engineering, vol. 72, pp. 26–38, 2018, doi: 10.1016/j.compeleceng.2018.09.001.
- Madhuri and A. R. Lakshmi, “Attack patterns for detecting and preventing DDoS and replay attacks,” International Journal of Engineering and Technology, vol. 2, no. 9, pp. 4850–4859, 2010, doi: 10.13140/RG.2.1.1723.8085
- Y. Muharish, “MPacket filter approach to detect denial of service attacks,” Unpublished report or thesis, 2016, https://scholarworks.lib.csusb.edu/etd/342.
- Srihari Rao, K. Chandra Sekharaiah, and A. Ananda Rao, “A survey of distributed denial-of-service (DDoS) defense techniques in ISP domains,” in Innovations in Computer Science and Engineering: Proceedings of the Fifth ICICSE 2017, Springer Singapore,pp.221–230,2019, doi: 10.1109/ACCESS.2019.2922196.
- Zhang, Q. Liu, and G. Zhao, “A real-time DDoS attack detection and prevention system based on per-IP traffic behavioral analysis,” in Proceedings of the 3rd International Conference on Computer Science and Information Technology (ICCSIT), vol. 2, pp. 163–167, IEEE, 2010, doi: 10.1109/ICCSIT.2010.5563549.
- Chen, K. Hwang, and W. S. Ku, “Collaborative detection of DDoS attacks over multiple network domains,” IEEE Transactions on Parallel and Distributed Systems, vol. 18, no. 12, pp. 1649–1662, 2007, doi: 10.1109/TPDS.2007.1111.
- Chen, J. M. Park, and R. Marchany, “TRACK: A novel approach for defending against distributed denial-of-service attacks,” Technical Report TR-ECE-06-02, Dept. of Electrical and Computer Engineering, Virginia Tech, 2006, doi: 10.1007/978-3-642-17881-8_24.
Downloads per Month
Downloads per Country
No related articles were found.