Privacy-Preserving Ddos Attack Detection using Cross-Domain: Challenges and Research
Sapna Jain1, Anupam Choudhary2, Anurag Sharma3, Brijesh Patel4

1Sapna Jain, Department of Computer Science and Engineering, MATS School of Engineering and Information Technology, Aarang, Raipur, India.
2Anupam Choudhary*, Department of Computer Science and Engineering, Kalaniketan Polytechnic College Jabalpur, India.
3Anurag Sharma, Department of Computer Science and Engineering, MATS School of Engineering and Information Technology, Aarang, Raipur, India.
4Brijesh Patel, Department of Aeronautics Engineering, MATS School of Engineering and Information Technology, Aarang, Raipur, India.
Manuscript received on September 22, 2019. | Revised Manuscript received on October 20, 2019. | Manuscript published on October 30, 2019. | PP: 2373-2382 | Volume-9 Issue-1, October 2019 | Retrieval Number: F92011088619/2019©BEIESP | DOI: 10.35940/ijeat.F9201.109119
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In this paper, we present a review of on hand IDS (Intrusion Detection Techniques) for DDoS assaults. Interruption discovery framework is a well known and computationally costly task. We additionally clarify the essentials of interruption identification framework. We represent the present methodologies for Intrusion Detection framework. From the expansive assortment of proficient procedures that have been created we will look at the most significant ones. Their qualities and shortcomings are likewise researched. For reasons unknown, the conduct of the calculations is substantially more comparative as not out of the ordinary.
Keywords: DoS, DDos, IDS, HTTP.