This document discusses using data mining techniques to detect HTTP flooding attacks, a type of distributed denial of service (DDoS) attack. It describes how HTTP floods work by overloading servers with requests from compromised devices called "zombies." The document then outlines several data mining techniques that can be used for detection, including intrusion detection systems (IDS) and IP traceback. IDS uses techniques like misuse detection, anomaly detection, and signature-based detection to monitor network traffic. IP traceback aims to trace attack packets back to their origin. The document concludes that continued improvement in data mining techniques can help better handle DDoS and DoS attacks.