Analyzing and Mitigating Distributed Denial-of-Service (DDoS) Attacks - A Python-Based Simulation Approach

The increasing prevalence of Distributed Denial of Service (DDoS) attacks poses a significant threat to the security and availability of online services and networks. These attacks leverage multiple compromised systems to overwhelm a target, rendering it inaccessible to legitimate users. This resear...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Ingenious (Tirana. Online) Jg. 5; H. 1; S. 20 - 36
Hauptverfasser: NIKLEKAJ, Malvina, MEMAJ, Elfat
Format: Journal Article
Sprache:Englisch
Veröffentlicht: 01.02.2025
ISSN:2789-4800, 2958-888X
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract The increasing prevalence of Distributed Denial of Service (DDoS) attacks poses a significant threat to the security and availability of online services and networks. These attacks leverage multiple compromised systems to overwhelm a target, rendering it inaccessible to legitimate users. This research presents an in-depth analysis of DDoS attack methodologies, their classification into volumetric, protocol-based, and application-layer attacks, and their real-world implications. To enhance understanding and mitigation strategies, this study introduces a Python-based simulation tool that replicates various DDoS attack techniques, including TCP, UDP, ICMP, and HTTP request floods. The tool leverages asynchronous programming and multiprocessing to simulate large-scale attack scenarios, enabling controlled testing of network resilience. Furthermore, this research explores state-of-the-art defensive mechanisms, including firewalls, rate limiting, DDoS scrubbing services, and AI-driven anomaly detection, emphasizing the role of automation in modern cybersecurity defenses. Additionally, an Intrusion Analysis System (IAS) powered by Python is proposed, integrating machine learning-based anomaly detection and real-time network traffic monitoring. This system provides organizations with adaptive and proactive defense capabilities, reducing downtime and mitigating service disruptions. The modular design of the system ensures seamless integration into existing network infrastructures, making it a scalable and effective solution for cybersecurity professionals. By combining theoretical analysis, practical implementation, and defensive strategies, this research contributes to the ongoing efforts in fortifying digital infrastructures against the evolving landscape of DDoS attacks. The findings underscore the importance of leveraging Python’s capabilities for both attack simulation and defense, paving the way for enhanced network security resilience in an increasingly interconnected digital world.
AbstractList The increasing prevalence of Distributed Denial of Service (DDoS) attacks poses a significant threat to the security and availability of online services and networks. These attacks leverage multiple compromised systems to overwhelm a target, rendering it inaccessible to legitimate users. This research presents an in-depth analysis of DDoS attack methodologies, their classification into volumetric, protocol-based, and application-layer attacks, and their real-world implications. To enhance understanding and mitigation strategies, this study introduces a Python-based simulation tool that replicates various DDoS attack techniques, including TCP, UDP, ICMP, and HTTP request floods. The tool leverages asynchronous programming and multiprocessing to simulate large-scale attack scenarios, enabling controlled testing of network resilience. Furthermore, this research explores state-of-the-art defensive mechanisms, including firewalls, rate limiting, DDoS scrubbing services, and AI-driven anomaly detection, emphasizing the role of automation in modern cybersecurity defenses. Additionally, an Intrusion Analysis System (IAS) powered by Python is proposed, integrating machine learning-based anomaly detection and real-time network traffic monitoring. This system provides organizations with adaptive and proactive defense capabilities, reducing downtime and mitigating service disruptions. The modular design of the system ensures seamless integration into existing network infrastructures, making it a scalable and effective solution for cybersecurity professionals. By combining theoretical analysis, practical implementation, and defensive strategies, this research contributes to the ongoing efforts in fortifying digital infrastructures against the evolving landscape of DDoS attacks. The findings underscore the importance of leveraging Python’s capabilities for both attack simulation and defense, paving the way for enhanced network security resilience in an increasingly interconnected digital world.
Author MEMAJ, Elfat
NIKLEKAJ, Malvina
Author_xml – sequence: 1
  givenname: Malvina
  surname: NIKLEKAJ
  fullname: NIKLEKAJ, Malvina
– sequence: 2
  givenname: Elfat
  surname: MEMAJ
  fullname: MEMAJ, Elfat
BookMark eNo1kDtPwzAYRS1UJErpwD_wSAeDYzuJPYaGl1QEUjuwRV8cp3VJ7Sp2kcKvp7yme-9wz3DO0ch5ZxC6TOh1KpUQN9DYNlU8P0FjplJJpJRvo2PPpSJCUnqGpiFsKaWcJ5xlaoy2hYNu-LRujcE1-NlGu4b4PUsbYm_rQzQNLo2z0BHfkqXpP6w2-Kos_XKGixhBvwdMcIFfh7jxjtxCOD6WdnfojiDvcLHf9x705gKdttAFM_3LCVrd363mj2Tx8vA0LxZEZyonTVYbZrKEcSEopw1ADTJVSaIYlbXJ60aDYaC0gVYwZVQt0kYp0JymAmTNJ2j2i9W9D6E3bbXv7Q76oUpo9aOp-tfEvwDCdF1R
ContentType Journal Article
DBID AAYXX
CITATION
DOI 10.58944/adif5937
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList CrossRef
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2958-888X
EndPage 36
ExternalDocumentID 10_58944_adif5937
GroupedDBID AAYXX
ALMA_UNASSIGNED_HOLDINGS
CITATION
GROUPED_DOAJ
ID FETCH-LOGICAL-c697-d6be2e612344030daaba859119208be7bdcae2a9ceaf429e9b45d99ac3054a8b3
ISSN 2789-4800
IngestDate Sat Nov 29 08:03:58 EST 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 1
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c697-d6be2e612344030daaba859119208be7bdcae2a9ceaf429e9b45d99ac3054a8b3
OpenAccessLink https://uet.edu.al/ingenious/wp-content/uploads/2025/04/Analyzing-and-Mitigating-Distributed-Denial-of-Service-DDoS-Attacks-A-Python-Based-Simulation-Approach.pdf
PageCount 17
ParticipantIDs crossref_primary_10_58944_adif5937
PublicationCentury 2000
PublicationDate 2025-2-00
PublicationDateYYYYMMDD 2025-02-01
PublicationDate_xml – month: 02
  year: 2025
  text: 2025-2-00
PublicationDecade 2020
PublicationTitle Ingenious (Tirana. Online)
PublicationYear 2025
SSID ssj0003313269
ssib051265812
Score 2.2818646
Snippet The increasing prevalence of Distributed Denial of Service (DDoS) attacks poses a significant threat to the security and availability of online services and...
SourceID crossref
SourceType Index Database
StartPage 20
Title Analyzing and Mitigating Distributed Denial-of-Service (DDoS) Attacks - A Python-Based Simulation Approach
Volume 5
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 2958-888X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0003313269
  issn: 2789-4800
  databaseCode: DOA
  dateStart: 20210101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2958-888X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssib051265812
  issn: 2789-4800
  databaseCode: M~E
  dateStart: 20210101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3PT9swFLYK7MAOaLCh_WDIQhxAyJCmdmIfy1rEbyGtB26VkzhSpi5FLKsYfz3v2Unq0QscUKWotRor7ff1vc-p3_cI2c1VpGQeaia10IyDpmdSas4gdSUBz5QKU-szexlfX8vbW3XT6Tw2tTCzSVyW8uFB3b0p1DAGYGPp7CvgbieFAXgOoMMRYIfji4C3NiOPTe3hVeFMNODlAD1ysb2Vwc3HJVwJm-asDhaoNAeD6U-8S9CvKqy8P2AQNW7-obkAO4ZkB8q0-F13-0L1amuxfHF7hnVadk8tTDYqIAvqwwPfy9Tddj4DUXzRP3eVQpNZ3b_boj68cuPDSa4r_4ZEKJo9zE3cwtpaQD1wf7cYN6YEksB2EW4Dr1jgVx1EAy8dO3uU54FeSMU5prGsyIVytjH_m2k_S3Lt1kNY9NiTx82pS2QljIXqestxiEWgg0Cb1dIPs3oPPS5th8T28zmjKjvbUTObJ288nTL6QNbqBQbtO2Ksk44pN8h7z3byI_nVUoQCReicItSjCF2gCN1DguzTmh6U0T716UHn9KANPT6R0clw9OOU1T03WBqpmGVRYkKDljycQ_jPtE40OhzCOiCQiYmTLNUm1Co1OgclY1TCBfygdQppg2uZ9DbJcjktzWdChU66Kk7h0ct5lGY64F1lAuyOFoEODb6QneabGt85Z5XxAjhfX_Kmb2R1zsMtslzd_zXfybt0VhV_7rctrE9z42mQ
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Analyzing+and+Mitigating+Distributed+Denial-of-Service+%28DDoS%29+Attacks+-+A+Python-Based+Simulation+Approach&rft.jtitle=Ingenious+%28Tirana.+Online%29&rft.au=NIKLEKAJ%2C+Malvina&rft.au=MEMAJ%2C+Elfat&rft.date=2025-02-01&rft.issn=2789-4800&rft.eissn=2958-888X&rft.volume=5&rft.issue=1&rft.spage=20&rft.epage=36&rft_id=info:doi/10.58944%2Fadif5937&rft.externalDBID=n%2Fa&rft.externalDocID=10_58944_adif5937
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2789-4800&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2789-4800&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2789-4800&client=summon