The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off

Cloud security is of the major concern in the deployment and protection of cloud deployment models. In this paper, detailed investigations on the recent DDoS attacks and comparative analysis of the various DDoS security solutions in the cloud computing environment are carried out. The comprehensive study of the cloud DDoS solutions clearly exemplifies the techniques, deployment layer, benchmark datasets, tools and performance metrics. The Cloud DDoS Detection and defense model using learning algorithms is designed to protect the cloud infrastructure considering the pitfalls in the existing procedures for real world problems. The model is based on anomaly detection and thus it is capable of protecting the public/private cloud from zero-day attacks. The availability of the cloud applications is improved significantly by defending cloud DDoS attacks and offers high quality of services to the legitimate users.


Cloud Computing, DDoS, Detection, Defense, Security.