Abstract
Distributed Denial of Service (DDoS) attacks have become a serious attack for internet security andCloud Computing environment. This kind of attacks is the most complex form of DoS (Denial of Service)attacks. This type of attack can simply duplicate its source address, such as spoofing attack, which defendingmethods do not able to disguises the real location of the attack. Therefore, DDoS attack is themost significant challenge for network. In this chapter we present different aspect of security in CloudComputing, mostly we concentrated on DDOS Attacks. The Authors illustrated all types of Dos Attacksand discussed the most effective detection methods.
| Original language | English |
|---|---|
| Title of host publication | Handbook of Research on End-to-End Cloud Computing Architecture Design |
| Publisher | IGI Global |
| Pages | 222-252 |
| Number of pages | 31 |
| ISBN (Electronic) | 9781522507604 |
| ISBN (Print) | 1522507590, 9781522507598 |
| DOIs | |
| State | Published - 6 Oct 2016 |
| Externally published | Yes |