DOI:10.20894/IJDMTA.
Periodicity: Bi Annual.
Impact Factor:
SJIF:4.893 & GIF:0.787
Submission:Any Time
Publisher: IIR Groups
Language: English
Review Process:
Double Blinded

News and Updates

Author can submit their paper through online submission. Click here

Paper Submission -> Blind Peer Review Process -> Acceptance -> Publication.

On an average time is 3 to 5 days from submission to first decision of manuscripts.

Double blind review and Plagiarism report ensure the originality

IJDMTA provides online manuscript tracking system.

Every issue of Journal of IJDMTA is available online from volume 1 issue 1 to the latest published issue with month and year.

Paper Submission:
Any Time
Review process:
One to Two week
Journal Publication:
June / December

IJDMTA special issue invites the papers from the NATIONAL CONFERENCE, INTERNATIONAL CONFERENCE, SEMINAR conducted by colleges, university, etc. The Group of paper will accept with some concession and will publish in IJDMTA website. For complete procedure, contact us at admin@iirgroups.org

Paper Template
Copyright Form
Subscription Form
web counter
web counter
Published in:   Vol. 1 Issue 2 Date of Publication:   December 2012

Detection of Distributed Denial of Service Attacks

A.Saradha,S.Thilagavathi

Page(s):   40-42 ISSN:   2278-2397
DOI:   10.20894/IJDMTA.102.001.002.004 Publisher:   Integrated Intelligent Research (IIR)

Denial-of-Service attacks, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Many Dos attacks, such as the Ping of Death ,Teardrop attacks etc., exploit the limitations in the TCP/IP protocols. like viruses, new Dos attacks are constantly being dreamed up by hackers.So the users have to take own effort of a large number of protected system such as Firewall or up-to-date antivirus software. . If the system or links are affected from an attack then the legitimate clients may not be able to connect it.. This detection system is the next level of the security to protect the server from major problems occurs such as Dos attacks, Flood IP attacks, and also the Proxy Surfer. So these kinds of anonymous activities barred out by using this Concept.