With the rise in cyber-attacks on cloud environments like Brute Force,
Malware, or Distributed Denial of Service attacks, information security officers and
data center administrators have a monumental task. Starting from the need to safeguard
the client data, data center security, and ensuring cloud service availability, the team
needs to ensure the highest priority to service delivery performance and functionality
being offered to the service consumers. Organizations design data center and service
delivery to cater to maximize device provisioning & availability, improve application
performance, ensure better server virtualization and end up securing data centers using
security solutions at the internet edge protection level. These security solutions prove to
be largely inadequate in times of a DDoS cyber-attack. In this chapter, traditional data
center design is compared to the proposed three-tier data center architecture design.
The author performed DDoS attacks on both architectures to determine the resilience to
withstand DDoS attacks by measuring the Real User Monitoring parameters and then
validated the data using the Parametric T-Test.
Keywords: DDoS, Data Center, ICMP, LOIC, RUDY, Single Tier, Slowloris, Three Tier.