Conclusions
We studied distributed denial of service attacks on the Internet.
We described how distributed attacks are conducted.
Review of some well known distributed denial of service techniques was given.
Various defense mechanisms that could be employed by networks and hosts have been reviewed.