International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015 ISSN: 2347-8578 www.ijcstjournal.org Page 13 Study on Recent Trends of Distributed Denial of Service Attack and Handling Approach Rajnish Kumar Mishra [1] , Amarnath Singh [2] , Vipin Kumar Gupta [3] Cyber Laws and Information Security Division Indian Institute of Information Technology Allahabad - India ABSTRACT This research paper explains the techniques and trends of an attacker to execute distributed denial of service (DDoS) attack to any targeted system based on recent incidents on various ISPs. DDoS attacks are newly evolved attack which actually attacks on the availability of the services and resources of the targeted system. A normal DDoS can be executed from anywhere in the distributed network and chock the victims service or server by sending large number of packets. Few countermeasures have been given by many researchers in this field. There are various technical experts and researchers are still working on this issue which became a very big problem for every service provider organization but still we do not have such solution to overcome with this problem completely .In this research paper we have introduced the attackers trend to perform DDoS in these days which is reflection based DDoS attack and their proposed mechanisms or methods to overcome with this problem up to the acceptable table. Keywords:- DDS Attack, MTN I. INTRODUCTION In today's internet environment we are mostly dependent on the technological things .we are accessing the services and information within a second through the internet connectivity where security is main concern which derives the concept of CIA: Confidentiality, Integrity, Availability. There are many security threats associated with each but recently, new type of security threats have emerged: one, which does not target the integrity or confidentiality of resources, but rather their availability. This newly evolved threat is known as Denial of Services (DoS) Attacks .DoS attack is an attack which prevents authorized users to use specific network service or resource such as any website, web service, or any system’s resource .There are many incidents related to DDoS which happened in past and recent past like Indian telecom regulator TRAI’s website was down due to DDoS attack and many organization has been suffered from DDoS attack like MTN and GitHub.so this is emerging and highly severe attack by which many organizations are suffering .many E-Commerce websites are getting slow down due to DDoS attack performed by the attackers .Attackers are following many ways to perform DDoS attack on their targeted system but In these days mostly attackers are following reflection based DDoS attack which is new trends of the attackers to perform DDoS attack . In this paper we will explain the reflection based DDoS and amplification based DDoS attack. There are four section in this paper, In the first section we will be discussing reflective DDoS and amplificative DDoS attack ,second section will be based on the DNS reflection attack because to perform reflection based attacks the attackers are using many resolvers and DNS is one of them which are using by the attackers to perform DDoS attacks and section third will be the few countermeasures of DDoS attack proposed by the researchers ,fourth section describes the conclusion of the discussion about the whole paper . 1.1 REFLECTION BASED ATTACK Recently DDoS related incidents was performed by the attackers which was Reflection based .To perform reflection based attack the attackers are RESEARCH ARTICLE OPEN ACCESS