A short degree Distributed Denial of Service (DDoS) attack has the aptitude to opaque its traffic because it is most parallel to genuine traffic. It can effortlessly avoid present recognition tools. Rating association procedures can enumerate noteworthy variances among attack traffic and genuine traffic centered on their rating values. In this manuscript, we practice dual rating association procedures, namely, Quick Rating Association (QRA) and Fractional Rating Association (FRA) to recognize shortdegree DDoS attacks. These procedures are empirically appraised using three real time datasets. Tentative outcomes display that both procedures can successfully categorize genuine traffic from attack traffic. We catch that FRA achieves better than QRA in recognition of short degree DDoS attacks in footings of positioning between malicious and genuine traffic. Keywords: DDoS attack, short -degree, network traffic, rating association.I. INTRODUCTION With the rapid growth in the number of applications on Internet-connected computers and the devices and the rise in the sophistication of attacks on the application, early recognition of Internet-based attacks is essential to reduce damage to genuine user's traffic. A DDoS attack is a DoS attack that uses multiple distributed attack sources. Typically, attackers use a large number of compromised computers, also called zombies, to launch a DoS attack against a single target or multiple targets with the intention of making one or more services unavailable to intended users [4]. Botnets have become a powerful way to control a large number of hosts, allowing the launching of sophisticated and stealth DDoS attack on target host(s) quickly [3,7].In the recent past, botnets have become more intelligent and capable, and as a consequence the amount of attack traffic has increased targeting servers and components of Internet infrastructure such as firewalls, routers, DNS servers as well as network bandwidth. Regardless of how well secured the victim system may be, its susceptibility to DDoS attacks depends on the state of security in the rest of the global Internet [1,10]. A lot of different tools are used by attackers to bypass security systems, and as a result, researchers have to upgrade their approaches to handle new attacks simultaneously. Some defense mechanisms concentrate on recognizing an attack close to the victim machine, because the recognition accuracy of these mechanisms is high. Network traffic comes in a stream of packets and it is difficult to distinguish genuine traffic from attack traffic. More importantly, the volume of attack traffic can be much larger than the system can handle. The behavior of network traffic is reflected by its statistical properties [13] because such properties summarize behavior. Association procedures can be used on the traffic summary to identify malicious traffic. A network or host can be compromised with DDoS attacks using two types of traffic, namely, high-degree DDoS traffic and short -degree DDoS traffic. High-degree traffic is...