The report discusses the concept of distributed denial of service attack and illustrates its working principle. The DDoS attacks are implemented with an aim of making the network resources or network servers of company inaccessible for the legitimate users. The DDoS attack although does not incorporate any malicious agent compromising any confidential data of the company, it surely leads to the wastage of resources and time. It is a bit difficult to control a DDoS attack mainly because it is very difficult to identify a legitimate request or a spam request. The report discusses three most commonly methods of mitigation of DDoS attack. The report further discusses a real example of DDoS attack that took place in April 13, 2016 and is known as Melbourne IT attack. This attack compromised a number of systems and suspended the number of Australian website for good 90 minutes. The attack was however mitigated by the enforcing an international traffic management plan. The report discusses the issues associated with the Melbourne IT attack.