
ترجمه مقاله نقش ضروری ارتباطات 6G با چشم انداز صنعت 4.0
- مبلغ: ۸۶,۰۰۰ تومان

ترجمه مقاله پایداری توسعه شهری، تعدیل ساختار صنعتی و کارایی کاربری زمین
- مبلغ: ۹۱,۰۰۰ تومان
An overview of DDoS attacks against cloud targets is presented, together with solution requirements, and a guideline for efficient solutions, leading to a novel multilevel alert-flow. To orchestrate future solutions, we give a vision towards novel “Detection Near Impossible” attacks.
Conclusion
DDoS attacks in the cloud are different from the behavior of attacks of fixed on-premise infrastructure. We provided a detailed introduction to the attack methods, consequences, and attack dynamics. This novel work is an attempt to analyze and gather the important requirements in designing DDoS mitigation solutions for cloud infrastructure. These requirements include optimization of five important factors governing the attack. These factors are sustainability/budget constraints, controlled autoscaling, minimizationbased optimization of attack traffic, MTT, and service quality and availability. We also compile important lessons learned pertaining to DDoS attacks in the recent past.
These lessons suggest that traffic filtering alone may not be sufficient to combat DDoS attacks in the cloud environment. We suggest considering sustainability, collaboration, resource management, damage minimization, and availability while handling DDoS attacks in cloud computing. We provide a multilevel alert flow-based collaborative DDoS detection solution framework that may be beneficial in designing efficient mitigation solutions. Finally, based on attack trends, we give a vision towards future attacks leading to DeNy DDos, as an open research problem for the community. This is supported by an extreme attack case of DeNy DDoS as an open research problem.