SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1568
HTTP FLOODING ATTACK DETECTION USING DATA MINING
TECHNIQUES
Arockia Panimalar.S1, Monica.J2, Muthumeenal.L3, Amala.S4
1Assistant Professor, Department of BCA & M.Sc SS, Sri Krishna Arts and Science College, Tamilnadu
2,3,4III BCA ‘A’, Department of BCA & M.Sc SS, Sri Krishna Arts and Science College, Tamilnadu
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract: DoS and DDoS, the network flooding attacks has
threats on network services, rapid detection and semantic
analysis are concentrated on secured features and reliable
network services. Flooding attack detection and in-depth
analysis system are the two features which uses data mining
techniques. DoS (Denial of Services) attack threat to internet
sites and among the hardest security problem, becauseoftheir
potential impact. DDoS (Distributed Denial of Services)attack
which is easily exhausted for the computing and
communication resources of the host in very short period of
time. It is the co-operative large scale attacks which are
produced from an enormous host which isknownasZOMBIES,
considered as the major threat to internet services. The latest
development in data mining methodologies are embedded
with variety of algorithms are from the field of statics, pattern
mining, machine learning and database. For protecting the
network routers, network servers, client host becoming the
handlers, ZOMBIES and victim of DDoS attack data mining
methods can be used as an ultimate weapon.
Key Words: DDoS, DoS and ZOMBIES.
1. INTRODUCTION
DDoS - A distributed denial of serviceattack ismostcommon
and damaging forms of attack on the cloud. The Denial of
service (DoS) attacks is for the unavailable functioning of
resources to the customers, hackers can send the unwanted
messages continuously and make the traffic on the network
from multiple resources, hackers will send packets to the
receiver which make harmful to the system and temporarily
stop the services between client and server communication.
HTTP (Hyper Text Transfer Protocol) flood is a type of
Distributed Denial of Service (DDoS) attack. HTTP flood
consists of “ZOMBIE ARMY” a group of large number of
compromised hosts.
2. DDOS ATTACKS
In a Denial-of-Service (DoS) attacks such as flooding,
software exploit, protocol based etc. DDoS - A distributed
denial of service attack is uses different machinestoprevent
the permissible use of services.
DDOS attacks are of different phases, they are as follows:
i. Recruit Phase – In Recruit phase, there are multiple
agents like slaves and zombiesmachineforsecuritypurpose.
ii. Exploit Phase - In Exploit phase, to utilize the attackedor
harmful host and then their security holes are transformed
into injected code.
iii. Inject Phase- In Inject phase, to inject the attacked or
harmed code to it (malicious code).
iv. Use Phase - In Use phase, it is used to send the attacked
code in the form of packets via agents to inject all the
machines further.
Fig 1: Architecture of DDoS Attack
A. HTTP FLOOD ATTACK
Fig 2: HTTP Get Attack
HTTP Flood attack is a type of (DDoS) attack in which the
attacked or harmful host changes to POST for hack the web
browser and services application. They are used as
interconnected computers which hasbeenconsideredasthe
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1569
aid of malware, which is considered as the disturbing
resources such as Trojan Horses, computer viruses, worms
etc. HTTP floods possess less bandwidth.
Fig 3: HTTP Post Attack
3. DATA MINING TECHNIQUES
Data mining is important for DDoS attack detection. It is
used to transfer the raw data into structured information.
Data mining follows six various types of classes namely
statistical classification, association rule learning,clustering
analysis, regression analysis and automatic summarization,
deviation detection.
Various techniques of data mining are used for detecting
DDoS attacks. They are:
A. Intrusion Detection System (IDS)
An Intrusion Detection System (IDS) is an application used
for controlling the network trafficandprotectsthesystemor
network administrator. It is a software application which is
used to monitor the network and system activities and finds
the different operations occurred. In field of business,
industry, security and health sectors LAN and WAN
networks are used.
Types of IDS
 Host based IDS
 Network based IDS
 Signature Based IDS
 Anomaly Based IDS
 Passive IDS
 Reactive IDS
 Application based IDS
Advantages of IDS
 Boost up Efficiency
 Easier to maintain and regulate security
 Can qualify and analyze the attacks/bugs
 Functioning of good context of protocol
 Tuned to specific information of networking
Intrusion detection system in data mining is the process
which is used to get the hidden information from the
databases. They are of two divisions, they are
i. Misuse Detection - Misuse detection is used as the
labeled/signature based detection.Itcanbedetectedonlyby
the recognized available signature.
ii. Anomaly Detection - Anomaly detection defines the
deviations between the models.
Technical Challenges
 Problem to false alarm, in which the different
application is being triggered in stopping the event
 Scalability conditions, in which the size of the
network fluctuates
 Data collection and logging
 Vulnerability to attacks
 Understanding and interpreting IDS data
 Keep track the IDS rule set regularly
 Alert correlation
Fig 4: Intrusion Detection System (IDS)
B. IP Traceback
IP Traceback is used for determining the reliability of
packets present on Internet. It is used to defend against the
DDOS attacks. LOGGING is the methodology which is usedto
log packets at key routers. It locates the originofthepackets.
It is complicated because IP address can be forged or
spoofed.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1570
Fig 5: IP Traceback
i. Link Testing
It starts from the victim of the source and assumes that the
attack is active till the end of the trace. Two variants of link
testing are:
1) Input Debugging and
2) Controlled Flooding
ii. Packet Marketing
It is one of the significant methods used. This marketing
utility the rarely used IP header to store the trailer, where it
is used for marking varies from scheme to scheme. It is
categorized into two types, they are
 Probabilistic Packet Marking
 Deterministic Packet Marking
4. CONCLUSION
In this paper, the study on HTTP flooding attack detection
using data mining techniques is carried out. DDoS attack is a
complex technique for attacking the computer networks.
Various techniques of data mining are used to detect DDoS
attack. The paper has discussed about IDS and IP Traceback.
The improvement in technology for handling DDoS attacks
and DoS attacks using data mining techniquescanbeutilized
more in future.
5. REFERENCES
[1]https://www.verisign.com/en_In/security-services/
ddos/ddos-attack/index.xhtml
[2] http://news.cnet.com/8301-1009_3-2001.htm.
[3]http://www.darkreading.com/security-services/
security/perimeter-security/222301511/index.html
[4] PeymanKabiriandAliA.Ghorbani-“ResearchonIntrusion
Detection and Response Survey”- International Journal of
Network Security, Vol.1, No.2, PP.84–102, Sep. 2005
[5] Intrusion Detection System Buyer’s Guide, Paul Dokas,
Levent Ertoz.
[6] Aleksandar Lazarevic, Jaideep Srivastava, PangNing
“Data Mining for Network Intrusion Detection”.
[7] Aleksandar Lazarević,Jaideep Srivastava, Vipin Kumar-
“Data Mining for intrusion detection”-Knowledge Discovery
in Databases 2003.

More Related Content

PDF
IRJET - IDS for Wifi Security
PDF
IRJET- Survey on Phishing Attack Detection and Mitigation
PDF
An Extensive Survey of Intrusion Detection Systems
PDF
ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A...
PDF
N44096972
PDF
Efficient String Matching Algorithm for Intrusion Detection
PDF
IRJET- A Review on Intrusion Detection System
PDF
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
IRJET - IDS for Wifi Security
IRJET- Survey on Phishing Attack Detection and Mitigation
An Extensive Survey of Intrusion Detection Systems
ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A...
N44096972
Efficient String Matching Algorithm for Intrusion Detection
IRJET- A Review on Intrusion Detection System
Detecting and Preventing Attacks Using Network Intrusion Detection Systems

What's hot (19)

PDF
IRJET- Survey on Mitigation Techniques of Economical Denial of Sustainabi...
PDF
Defense mechanism for d do s attack through machine learning
PDF
Es34887891
PPT
AN INTRUSION DETECTION SYSTEM
PDF
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
PDF
Wireless Security Needs For Enterprises
PPTX
Intrusion detection system
PDF
A hybrid intrusion detection system for cloud computing environments
PDF
Hybrid Intrusion Detection System using Weighted Signature Generation over An...
PDF
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
PPTX
Intrusion detection systems
PPSX
Intrusion detection system
PPTX
Intrusion detection system
PDF
Intrusion Detection and Prevention System in an Enterprise Network
PDF
Bt33430435
DOC
06686259 20140405 205404
PDF
Intrusion detection and prevention system for network using Honey pots and Ho...
PDF
D03302030036
PDF
1776 1779
IRJET- Survey on Mitigation Techniques of Economical Denial of Sustainabi...
Defense mechanism for d do s attack through machine learning
Es34887891
AN INTRUSION DETECTION SYSTEM
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Wireless Security Needs For Enterprises
Intrusion detection system
A hybrid intrusion detection system for cloud computing environments
Hybrid Intrusion Detection System using Weighted Signature Generation over An...
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
Intrusion detection systems
Intrusion detection system
Intrusion detection system
Intrusion Detection and Prevention System in an Enterprise Network
Bt33430435
06686259 20140405 205404
Intrusion detection and prevention system for network using Honey pots and Ho...
D03302030036
1776 1779
Ad

Similar to IRJET- HTTP Flooding Attack Detection using Data Mining Techniques (20)

PDF
Defense mechanism for ddos attack through machine learning
PDF
IRJET- DDOS Detection System using C4.5 Decision Tree Algorithm
PDF
A Study on Data Mining Based Intrusion Detection System
PDF
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
PDF
International Journal of Computational Science and Information Technology (I...
PDF
A Study on Data Mining Based Intrusion Detection System
PDF
Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...
PDF
1766 1770
PDF
1766 1770
PDF
I0945056
PPTX
DDOS ATTACKS
PDF
Bt33430435
PDF
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE
PPTX
Role of data mining in cyber security
PDF
Artificial intelligence-driven method for the discovery and prevention of dis...
PDF
DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...
PDF
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE
PDF
A vivacious approach to detect and prevent d do s attack
PPTX
DDOS_Attack_and_Mitigation_Techniques.pptx
PDF
Vol 6 No 1 - October 2013
Defense mechanism for ddos attack through machine learning
IRJET- DDOS Detection System using C4.5 Decision Tree Algorithm
A Study on Data Mining Based Intrusion Detection System
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
International Journal of Computational Science and Information Technology (I...
A Study on Data Mining Based Intrusion Detection System
Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...
1766 1770
1766 1770
I0945056
DDOS ATTACKS
Bt33430435
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE
Role of data mining in cyber security
Artificial intelligence-driven method for the discovery and prevention of dis...
DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE
A vivacious approach to detect and prevent d do s attack
DDOS_Attack_and_Mitigation_Techniques.pptx
Vol 6 No 1 - October 2013
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
additive manufacturing of ss316l using mig welding
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
Well-logging-methods_new................
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
Construction Project Organization Group 2.pptx
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
Geodesy 1.pptx...............................................
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
PPT on Performance Review to get promotions
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
Lecture Notes Electrical Wiring System Components
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
DOCX
573137875-Attendance-Management-System-original
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
additive manufacturing of ss316l using mig welding
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Well-logging-methods_new................
CH1 Production IntroductoryConcepts.pptx
Construction Project Organization Group 2.pptx
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
OOP with Java - Java Introduction (Basics)
Geodesy 1.pptx...............................................
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPT on Performance Review to get promotions
Model Code of Practice - Construction Work - 21102022 .pdf
Lecture Notes Electrical Wiring System Components
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
573137875-Attendance-Management-System-original
Embodied AI: Ushering in the Next Era of Intelligent Systems

IRJET- HTTP Flooding Attack Detection using Data Mining Techniques

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1568 HTTP FLOODING ATTACK DETECTION USING DATA MINING TECHNIQUES Arockia Panimalar.S1, Monica.J2, Muthumeenal.L3, Amala.S4 1Assistant Professor, Department of BCA & M.Sc SS, Sri Krishna Arts and Science College, Tamilnadu 2,3,4III BCA ‘A’, Department of BCA & M.Sc SS, Sri Krishna Arts and Science College, Tamilnadu ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract: DoS and DDoS, the network flooding attacks has threats on network services, rapid detection and semantic analysis are concentrated on secured features and reliable network services. Flooding attack detection and in-depth analysis system are the two features which uses data mining techniques. DoS (Denial of Services) attack threat to internet sites and among the hardest security problem, becauseoftheir potential impact. DDoS (Distributed Denial of Services)attack which is easily exhausted for the computing and communication resources of the host in very short period of time. It is the co-operative large scale attacks which are produced from an enormous host which isknownasZOMBIES, considered as the major threat to internet services. The latest development in data mining methodologies are embedded with variety of algorithms are from the field of statics, pattern mining, machine learning and database. For protecting the network routers, network servers, client host becoming the handlers, ZOMBIES and victim of DDoS attack data mining methods can be used as an ultimate weapon. Key Words: DDoS, DoS and ZOMBIES. 1. INTRODUCTION DDoS - A distributed denial of serviceattack ismostcommon and damaging forms of attack on the cloud. The Denial of service (DoS) attacks is for the unavailable functioning of resources to the customers, hackers can send the unwanted messages continuously and make the traffic on the network from multiple resources, hackers will send packets to the receiver which make harmful to the system and temporarily stop the services between client and server communication. HTTP (Hyper Text Transfer Protocol) flood is a type of Distributed Denial of Service (DDoS) attack. HTTP flood consists of “ZOMBIE ARMY” a group of large number of compromised hosts. 2. DDOS ATTACKS In a Denial-of-Service (DoS) attacks such as flooding, software exploit, protocol based etc. DDoS - A distributed denial of service attack is uses different machinestoprevent the permissible use of services. DDOS attacks are of different phases, they are as follows: i. Recruit Phase – In Recruit phase, there are multiple agents like slaves and zombiesmachineforsecuritypurpose. ii. Exploit Phase - In Exploit phase, to utilize the attackedor harmful host and then their security holes are transformed into injected code. iii. Inject Phase- In Inject phase, to inject the attacked or harmed code to it (malicious code). iv. Use Phase - In Use phase, it is used to send the attacked code in the form of packets via agents to inject all the machines further. Fig 1: Architecture of DDoS Attack A. HTTP FLOOD ATTACK Fig 2: HTTP Get Attack HTTP Flood attack is a type of (DDoS) attack in which the attacked or harmful host changes to POST for hack the web browser and services application. They are used as interconnected computers which hasbeenconsideredasthe
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1569 aid of malware, which is considered as the disturbing resources such as Trojan Horses, computer viruses, worms etc. HTTP floods possess less bandwidth. Fig 3: HTTP Post Attack 3. DATA MINING TECHNIQUES Data mining is important for DDoS attack detection. It is used to transfer the raw data into structured information. Data mining follows six various types of classes namely statistical classification, association rule learning,clustering analysis, regression analysis and automatic summarization, deviation detection. Various techniques of data mining are used for detecting DDoS attacks. They are: A. Intrusion Detection System (IDS) An Intrusion Detection System (IDS) is an application used for controlling the network trafficandprotectsthesystemor network administrator. It is a software application which is used to monitor the network and system activities and finds the different operations occurred. In field of business, industry, security and health sectors LAN and WAN networks are used. Types of IDS  Host based IDS  Network based IDS  Signature Based IDS  Anomaly Based IDS  Passive IDS  Reactive IDS  Application based IDS Advantages of IDS  Boost up Efficiency  Easier to maintain and regulate security  Can qualify and analyze the attacks/bugs  Functioning of good context of protocol  Tuned to specific information of networking Intrusion detection system in data mining is the process which is used to get the hidden information from the databases. They are of two divisions, they are i. Misuse Detection - Misuse detection is used as the labeled/signature based detection.Itcanbedetectedonlyby the recognized available signature. ii. Anomaly Detection - Anomaly detection defines the deviations between the models. Technical Challenges  Problem to false alarm, in which the different application is being triggered in stopping the event  Scalability conditions, in which the size of the network fluctuates  Data collection and logging  Vulnerability to attacks  Understanding and interpreting IDS data  Keep track the IDS rule set regularly  Alert correlation Fig 4: Intrusion Detection System (IDS) B. IP Traceback IP Traceback is used for determining the reliability of packets present on Internet. It is used to defend against the DDOS attacks. LOGGING is the methodology which is usedto log packets at key routers. It locates the originofthepackets. It is complicated because IP address can be forged or spoofed.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1570 Fig 5: IP Traceback i. Link Testing It starts from the victim of the source and assumes that the attack is active till the end of the trace. Two variants of link testing are: 1) Input Debugging and 2) Controlled Flooding ii. Packet Marketing It is one of the significant methods used. This marketing utility the rarely used IP header to store the trailer, where it is used for marking varies from scheme to scheme. It is categorized into two types, they are  Probabilistic Packet Marking  Deterministic Packet Marking 4. CONCLUSION In this paper, the study on HTTP flooding attack detection using data mining techniques is carried out. DDoS attack is a complex technique for attacking the computer networks. Various techniques of data mining are used to detect DDoS attack. The paper has discussed about IDS and IP Traceback. The improvement in technology for handling DDoS attacks and DoS attacks using data mining techniquescanbeutilized more in future. 5. REFERENCES [1]https://www.verisign.com/en_In/security-services/ ddos/ddos-attack/index.xhtml [2] http://news.cnet.com/8301-1009_3-2001.htm. [3]http://www.darkreading.com/security-services/ security/perimeter-security/222301511/index.html [4] PeymanKabiriandAliA.Ghorbani-“ResearchonIntrusion Detection and Response Survey”- International Journal of Network Security, Vol.1, No.2, PP.84–102, Sep. 2005 [5] Intrusion Detection System Buyer’s Guide, Paul Dokas, Levent Ertoz. [6] Aleksandar Lazarevic, Jaideep Srivastava, PangNing “Data Mining for Network Intrusion Detection”. [7] Aleksandar Lazarević,Jaideep Srivastava, Vipin Kumar- “Data Mining for intrusion detection”-Knowledge Discovery in Databases 2003.