Abstract:
Information and technology devices are being used extensively these days on the internet. Distributed Denial of Service (DDoS) attacks generated on the server denies the access of the server to the genuine users. The servers needs to be protected from the DDoS attack. In this paper we compare the different defense mechanisms used to protect the DDoS attack. The defense mechanisms used must ensure better network resource utilization.