Reference Hub5
Comparing Single Tier and Three Tier Infrastructure Designs against DDoS Attacks

Comparing Single Tier and Three Tier Infrastructure Designs against DDoS Attacks

Akashdeep Bhardwaj, Sam Goundar
Copyright: © 2017 |Volume: 7 |Issue: 3 |Pages: 17
ISSN: 2156-1834|EISSN: 2156-1826|EISBN13: 9781522515036|DOI: 10.4018/IJCAC.2017070103
Cite Article Cite Article

MLA

Bhardwaj, Akashdeep, and Sam Goundar. "Comparing Single Tier and Three Tier Infrastructure Designs against DDoS Attacks." IJCAC vol.7, no.3 2017: pp.59-75. http://doi.org/10.4018/IJCAC.2017070103

APA

Bhardwaj, A. & Goundar, S. (2017). Comparing Single Tier and Three Tier Infrastructure Designs against DDoS Attacks. International Journal of Cloud Applications and Computing (IJCAC), 7(3), 59-75. http://doi.org/10.4018/IJCAC.2017070103

Chicago

Bhardwaj, Akashdeep, and Sam Goundar. "Comparing Single Tier and Three Tier Infrastructure Designs against DDoS Attacks," International Journal of Cloud Applications and Computing (IJCAC) 7, no.3: 59-75. http://doi.org/10.4018/IJCAC.2017070103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

With the rise in cyber-attacks on cloud environments like Brute Force, Malware or Distributed Denial of Service attacks, information security officers and data center administrators have a monumental task on hand. Organizations design data center and service delivery with the aim of catering to maximize device provisioning & availability, improve application performance, ensure better server virtualization and end up securing data centers using security solutions at internet edge protection level. These security solutions prove to be largely inadequate in times of a DDoS cyber-attack. In this paper, traditional data center design is reviewed and compared to the proposed three tier data center. The resilience to withstand against DDoS attacks is measured for Real User Monitoring parameters, compared for the two infrastructure designs and the data is validated using T-Test.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.