References
[1]. Akilandeswari, V., & Shalinie, S. M. (2012, December).
Probabilistic neural network based attack traffic classification. In 2012, Fourth International Conference on
Advanced Computing (ICoAC) (pp. 1-8). IEEE. https://doi.
org/10.1109/ICoAC.2012.6416848
[2]. Center for Applied Internet Data Analysis. (2007). The
CAIDA "DDoS Attack 2007" Dataset. Retrieved from https://
www.caida.org/catalog/datasets/ddos-20070804_
dataset/
[3]. Chevalier, S. (2020). Global retail e-commerce sales
worldwide from 2014-2024. Retrieved from https://www.
statista.com/statistics/379046/worldwide-retail-ecommerce-
sales/
[4]. Felter, B. (2020). 7 of the most famous recent DDoS
attacks. Retrieved from https://www.vxchnge.com/blog/
recent-ddos-attacks-on-companies
[5]. Infographic. (n.d.). Impact of DDoS on enterprise
organizations, Corero. Retrieved from https://www.corero.
com/blog/infographic-impact-of-ddos-on-enterpriseorganizations/
[6]. Kandula, S., Katabi, D., Jacob, M., & Berger, A. (2005,
May). Surviving organized DDoS attacks that mimic flash
crowds. In USENIX 2nd Symposium on Network System
Design and Implementation (pp. 287-300).
[7]. Le, Q., Zhanikeev, M., & Tanaka, Y. (2007, May).
Methods of distinguishing flash crowds from spoofed DoS
attacks. In 2007, Next Generation Internet Networks (pp.
167-173). IEEE. https://doi.org/10.1109/NGI.2007.371212
[8]. Office Chai. (2015). The story behind the site's big
billion days crash in 2015. Retrieved from https://officechai.
com/startups/former-flipkart-cpo-punit-soni-reveals-storybehind-
sites-big-billion-days-crash-2015/
[9]. Sekhar, C. (2021). Deep learning algorithms for
intrusion detection systems: Extensive comparison analysis.
Turkish Journal of Computer and Mathematics Education
(TURCOMAT), 12(11), 2990-3000.
[10]. Sekhar, C. H., & Rao, K. V. (2019, May). A study:
Machine learning and deep learning approaches for
intrusion detection system. In International Conference on
Computer Networks and Inventive Communication
Technologies (pp. 845-849). Cham: Springer. https://doi.
org/10.1007/978-3-030-37051-0_94
[11]. Sekhar, Ch., Rao, K. V., & Prasad, M. H. M. K. (2020).
Comparison performance of machine learning techniques
for intrusion detection system: A review. i-manager's Journal
on Computer Science, 7(4), 55-61. https://doi.org/10.26634/
jcom.7.4.17108
[12]. Sujata, J., Menachem, D., Akshay, P., & Viraj, T. (2017).
Impact of flash sales on consumers & e-commerce
industry in India. In Annual International Conference on
Qualitative & Quantitative Economics Research (pp. 11-
19). https://doi.org/10.5176/2251-2012_QQE17.9
[13]. Tandon, R., Palia, A., Ramani, J., Paulsen, B., Bartlett,
G., & Mirkovic, J. (2021, June). Defending web servers
against flash crowd attacks. In International Conference
on Applied Cryptography and Network Security (pp. 338-
361). Cham: Springer. https://doi.org/10.1007/978-3-030-
78375-4_14
[14]. World Cup. (1998). Git Hub Gist. Retrieved from
https://gist.github.com/Mic92/633676c3d4456b1371e07
2dee7d4650e