首页> 外文期刊>International journal of e-services and mobile applications >Survey on DDoS Attacks and Defense Mechanisms in Cloud and Fog Computing
【24h】

Survey on DDoS Attacks and Defense Mechanisms in Cloud and Fog Computing

机译:云雾计算中的DDoS攻击与防御机制研究

获取原文
获取原文并翻译 | 示例
           

摘要

This article describes how cloud computing has emerged as a strong competitor against traditional IT platforms by offering low-cost and “pay-as-you-go” computing potential and on-demand provisioning of services. Governments, as well as organizations, have migrated their entire or most of the IT infrastructure to the cloud. With the emergence of IoT devices and big data, the amount of data forwarded to the cloud has increased to a huge extent. Therefore, the paradigm of cloud computing is no longer sufficient. Furthermore, with the growth of demand for IoT solutions in organizations, it has become essential to process data quickly, substantially and on-site. Hence, Fog computing is introduced to overcome these drawbacks of cloud computing by bringing intelligence to the edge of the network using smart devices. One major security issue related to the cloud is the DDoS attack. This article discusses in detail about the DDoS attack, cloud computing, fog computing, how DDoS affect cloud environment and how fog computing can be used in a cloud environment to solve a variety of problems.
机译:本文介绍了云计算如何通过提供低成本和“按需付费”的计算潜力以及按需提供服务的优势,成为传统IT平台的强大竞争对手。政府以及组织已经将其整个或大部分IT基础架构迁移到了云中。随着物联网设备和大数据的出现,转发到云的数据量已大大增加。因此,云计算的范式已不再足够。此外,随着组织对物联网解决方案需求的增长,快速,大量和现场处理数据变得至关重要。因此,引入雾计算以通过使用智能设备将智能带入网络边缘来克服云计算的这些缺点。与云相关的一个主要安全问题是DDoS攻击。本文详细讨论了DDoS攻击,云计算,雾计算,DDoS如何影响云环境以及如何在云环境中使用雾计算来解决各种问题。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号