I. Introduction
A huge number of gadgets are being connected to the internet as technology develops quickly. Because of the enormous increase in dependence on remote servers, it is essential that these servers be available as needed [1]. Even brief periods of outage can result in significant losses for enterprises. DoS attacks are one of these types of assaults, which carried on an insecure network that may make the services supplied by the businesses unavailable [2]. In a DoS attack, the attacker consumes computing resources by creating an undesirable overload to block legitimate users from finishing their tasks on time. It also controls resource management vulnerabilities caused by logical and programming mistakes in handling network packets [3]. The primary targets of attackers today are government websites, social networking sites, educational institutions, and banking websites. Intrusion Detection Systems (IDSs) are one of the many options available to protect the victim systems from such attacks [4]. IDS can be deployed either on the server-side or the client-side and offers security dependent on the requirements of the user. Conformity of style throughout a conference proceedings. Margins, column widths, line spacing, and type styles are built-in; examples of the type styles are provided throughout this document and are identified in italic type, within parentheses, following the example. Some components, such as multi-levelled equations, graphics, and tables are not prescribed, although the various table text styles are provided. The formatter will need to create these components, incorporating the applicable criteria.