@Article{jcs.2021.018623, AUTHOR = {Isha Sood, Varsha Sharma}, TITLE = {Computational Intelligent Techniques To Detect DDOS Attacks : A Survey}, JOURNAL = {Journal of Cyber Security}, VOLUME = {3}, YEAR = {2021}, NUMBER = {2}, PAGES = {89--106}, URL = {http://www.techscience.com/JCS/v3n2/43997}, ISSN = {2579-0064}, ABSTRACT = {The Internet is often targeted by the Distributed Denial of Service (DDOS) Attacks that deliberately utilize resources and bandwidth to prohibit access to potential users. The attack possibility is that the packets are filled massively. A DOS attack is launched by a single source, while a DDOS attack is originated from numerous resources. DDoS attacks are not capable of stealing website user’s information. The prime motive of the DDoS attacks is to devastate the website resources. Distributed Denial of Service (DDoS) attacks are disruptive to internet access on the Network. The attitude of the customer to get fast and reliable services can be seriously influenced by DDoS attackers. In the digital era of today, cases of DDoS attacks have also been exceeded in the wireless, smartphone, and IoT attacks with catastrophic implications. We will soon be experiencing the 5G smartphone rebellion, but there are indications that 5G networks too are becoming victim to DDoS attacks but the existing DDoS detection and protection strategies are not able to handle DDOS attacks successfully therefore, thorough research on implementing computational intelligent strategies in the detection and defense techniques has been performed to recognize, mitigate, and avoid these attacks. But the most suitable and efficient defense strategy for these attacks remains an issue to be addressed in the future. This review article concentrates on the most prevalent methods of detection and defense against DDoS attacks that incorporate computational intelligence. The analysis describes attacks and explains them. The key factors relevant to the detection of DDOS attacks are included in this research like methods, tools, and detection accuracy. Finally, various challenges attached to the detection of DDOS attacks and research gaps are depicted.}, DOI = {10.32604/jcs.2021.018623} }