**6.6 Result analysis**

After analyzing the infrastructure, we now focus on what the cloud infrastructure has to offer for implementation (**Figures 23**–**25**).


**Figure 21.**

*Real user monitoring for application server responses.*

**33**

and outgoing requests.

outgoing.

in **Figure 26**.

**Figure 24.**

**Figure 23.**

visited by users in network.

*Threats blocked based on the requests coming into the cloud system.*

*Cloud Computing Security Services to Mitigate DDoS Attacks*

*Populated report for file server access activity on cloud-based premises.*

3.Web application firewall → Protects web servers and manages the incoming

4.Web Security Gateway → Web proxy filters manage and monitor websites

Web application firewall (WAF) prevents DDoS attack including SQL injection and XSS attacks to name a few. This is integrated with the implementation as shown

5.Email security → Scans, monitors, and protects emails incoming and

*DOI: http://dx.doi.org/10.5772/intechopen.92683*

**Figure 22.** *SaaS availability monitor.*

*Cloud Computing Security Services to Mitigate DDoS Attacks DOI: http://dx.doi.org/10.5772/intechopen.92683*

#### **Figure 23.**

*Cloud Computing Security - Concepts and Practice*

ture has to offer for implementation (**Figures 23**–**25**).

(**Figure 22**).

**6.6 Result analysis**

access management.

*Real user monitoring for application server responses.*

The below graph displays the availability trend metrics obtained after performing the DoS attacks on the two architectures for network and application layer design

After analyzing the infrastructure, we now focus on what the cloud infrastruc-

2.Active directory → Authentication, authorization, and group policies for

1.Firewall → Prevent threats entering the network from outside.

**32**

**Figure 22.**

**Figure 21.**

*SaaS availability monitor.*

*Populated report for file server access activity on cloud-based premises.*

#### **Figure 24.**

*Threats blocked based on the requests coming into the cloud system.*


Web application firewall (WAF) prevents DDoS attack including SQL injection and XSS attacks to name a few. This is integrated with the implementation as shown in **Figure 26**.


#### **Figure 25.**

*Logs displaying the threat level with its warning on a cloud-based setup.*


**Figure 26.**

*Shows how an attack gets categorized in the WAF.*
