209
Rashmi V. Deshmukh and Kailas K. Devadkar / Procedia Computer Science 49 ( 2015 ) 202 – 210
Fig. 4. DDoS experienced by organizations
•
Precise: The solution selected should not give lots of false positive. Many methods need the tra
ffi
c to be dropped
or discarded and the solution must not drop genuine tra
ffi
c.
2. Conclusion
As DDoS attacks are on rise in cloud computing. This paper provides a brief survey on DDoS attacks, then
taxonomy of attacks, its types and various counter measures to mitigate the DDoS attacks. This survey confers DDoS
detection, prevention and tolerance techniques. The paper concludes by providing some points to be considered while
selecting DDoS defense solution.
References
1. P. Mell and T. Grance, “The NIST definition of cloud computing (draft),” NIST special publication, vol. 800, no. 145, p. 7, 2011.
2. Reference Architecture Doc 2011 NIST-CloudComputing.pdf.
3. T. Dillon, C. Wu, and E. Chang, “Cloud Computing: Issues and Challenges,” in
Dostları ilə paylaş: