Abstract
This article presents research on building DDoS assaults to investigate network weaknesses and defensive techniques. Using DVWA as a target, the study consisted of setting up a controlled simulation environment using VMware to replicate many attack methods with hping and Slowloris and using Wireshark to examine packet flow and destination. Nmap also facilitated network reconnaissance so that attack dynamics could be fully examined. The results provide significant fresh insights into the generation of DDoS assaults and the effectiveness of defending strategies at many phases: early detection, decision-making, and adaptive defence.
View more >>