Detection of DDoS/DoS Attack Methodologies in Cloud Computing Network: A Survey
Keywords:
IAAS, PAAS, Public, Private, Hybrid, Community, Integrity, Confidentiality, AvailabilityAbstract
The concept of cloud computing has been proposed for many years, and the first cloud computing service was launched in the 21st century. Cloud computing uses the Internet or the cloud to provide computing services such as servers, storage, databases, networks, software, analytics, and intelligence. The three types of cloud computing include IAAS, PAAS, and SAAS. CIA, which stands for Trust, Integrity, and Availability, is the foundation of information security. While DDoS/DoS destroys availability, network unavailability and network inadequacy affect reliability. DoS and distributed DoS (DDoS) attacks have become more sophisticated and cannot be stopped by traditional protection tools in cloud computing. Machine learning and neural networks are subcategories of software computing techniques that can be used for network analysis to detect patterns in the occurrence of DDoS/DoS attacks. With the rise of cloud computing, the threat of attacks has also increased. Attackers are also using new technologies to attack the cloud to disrupt services. These attacks can cause serious damage to cloud service providers and their customers. DDoS/DoS attacks attempt to prevent loss of revenue, reputation, and trust. By using cloud computing technology, cloud service providers can ensure that their services are secure and reliable, thereby enhancing confident and proud customer experience.
Downloads
Published
How to Cite
Issue
Section
License
This is an open Access Article published by Research Center of Computing & Biomedical Informatics (RCBI), Lahore, Pakistan under CCBY 4.0 International License