
5 CONCLUSIONS
In this study, we explored the impact of various
Distributed Denial of Service (DDoS) attacks on
server performance, with a particular focus on la-
tency, downtime, CPU and memory utilization, and
network traffic. The results demonstrated that both
Layer 4 and Layer 7 attacks have significant conse-
quences on server stability and resource utilization.
Our findings reveal that while Layer 4 attacks such
as UDP Flood and TCP Flood lead to dramatic in-
creases in packets per second (PPS) and bandwidth
consumption, they also result in severe latency spikes
and downtime, potentially causing total service dis-
ruptions. On the other hand, Layer 7 attacks like
HTTP Flood and HTTP/2 Requests, though less over-
whelming in terms of network traffic, still contribute
to substantial delays and service degradation over
time. Proxy-based attacks, which use intermediary
servers to obscure the attack’s origin, showed mod-
erate increases in latency and downtime. They proved
to be highly effective in bypassing detection and caus-
ing extended server disruptions. More sophisticated
attack methods, such as Proxy Socket Attacks and
Proxy Request Attacks, had the most significant im-
pact on server performance, leading to prolonged ser-
vice outages. From a mitigation and monitoring per-
spective, it is clear that a multi-faceted approach is
essential. While DDoS protection mechanisms like
rate limiting, traffic filtering, and server scaling are
critical in mitigating these attacks, continuous mon-
itoring of latency, CPU usage, and network traffic is
also paramount for early detection and swift response.
Future research should focus on improving detection
methods for sophisticated proxy-based attacks and
optimizing resource allocation to handle large-scale
traffic surges effectively. This study provides valuable
insights for administrators and security teams looking
to enhance their defense strategies against DDoS at-
tacks. Further investigation into advanced attack tech-
niques and the development of more resilient server
architectures could help minimize the impact of such
attacks on individual systems and network infrastruc-
tures.
6 FUTURE WORK AND SCOPE
Future research should explore additional DDoS tech-
niques, such as ICMP floods and Slowloris at-
tacks, to assess their impact on network performance.
Advanced mitigation strategies, including machine
learning-based behavioral filtering, hybrid defenses,
and cloud-based solutions, warrant further investiga-
tion. Traffic pattern analysis of SYN Floods and DNS
amplification can offer deeper insights into adaptive
defenses. Developing standardized metrics, such as
detection time, mitigation time, and recovery time, is
essential for consistent evaluation of defense mecha-
nisms.
REFERENCES
Aamir, M. and Zaidi, S. (2022). Traditional and mod-
ern defense mechanisms for ddos attacks. ACM
Computing Surveys, 54:1–28.
Author, A. (2022). A literature review on ddos
attacks, detection techniques, and prevention
mechanisms. International Journal for Research
in Applied Science and Engineering Technology,
10:567–578.
Huang, B., Zhang, C., and Li, D. (2022). A low-
cost iot-based ddos attack architecture: Botnet
growth and optimal strategies. Elsevier Com-
puter Networks, 205:108916.
Kumari, S. and Jain, R. (2022). Ddos attacks target-
ing iot networks: Variants, security issues, and
defense strategies. Springer Wireless Personal
Communications, 125:345–360.
Singh, A. and Gupta, B. (2022). A comprehensive
review of ddos attacks and defense mechanisms
in web-enabled computing platforms. IEEE Ac-
cess, 10:12345–12360.
Tripathi, R. and Mehtre, B. (2022). Impact and coun-
termeasures for dos and ddos attacks on commu-
nication networks. IEEE Transactions on Net-
work and Service Management, 18:1234–1245.
Mechanics in DDoS: A Study of Layer 4 and Layer 7 Threat Vectors
413