DDoS Mitigation in the Cloud: Part II

There are five general requirements to remove an attack in the cloud: (i) Detect the attack asap and determine its size; (ii) Attempt to mitigate its effects as much as is possible; (iii) Migrate the Virtual Machine (VM), which is under attack to safe physical servers if necessary; (iv) In order to migrate the VM, … Continue reading DDoS Mitigation in the Cloud: Part II