A Review of Different DDOS Attacks in Cloud Based Environment
1 Nivedita Bhardwaj*; 2 Anita GanpatiFor different stakeholders to make an informed judgment about cloud adoption, security concerns pertaining to cloud computing are pertinent. In addition to data breaches, the attack space for cloud-specific solutions is being revisited by the cyber security research community since these problems impact service quality, budget, and resource management. One such severe attack in the cloud realm is the Distributed Denial of Service (DDoS) attack. It is merely a method of sending out countless fictitious requests to prevent actual users from accessing web resources. Some important data about the various kinds of DDoS assaults will be presented in this paper. The many DDoS varieties are compiled, along with their strike capabilities and, most importantly, how the best cloud computing environment issues can be addressed and resolved for the advantage of all cloud continuum stakeholders. The main obstacles to an efficient DDoS defense system are also examined.