This report provides a comprehensive overview of Distributed Denial of Service (DDoS) attacks, focusing specifically on Ping Flooding attacks. It details the entities involved in a DDoS attack, explaining the roles of victim systems, attackers, master zombies, and slave zombies. The report then delves into the mechanics of Ping Flooding, a common DDoS technique that utilizes ICMP echo requests to overwhelm a target system. It discusses tools like hping3 used to execute such attacks. The report concludes by outlining mitigation strategies for DDoS attacks, including techniques like integrated Intserv, differentiated services, class-based queuing, resource pricing, and throttling. These strategies aim to alleviate the impact of the flood of fake packets by managing resources and limiting traffic flow.