A Comparative Analysis of Cloud-Native Security Models and Their Efficacy Against Distributed Denial of Service Attacks
Keywords:
Cloud-native security, Distributed Denial of Service, DDoS mitigation, container security, cloud computing, automated defenses, zero trust architectureAbstract
The proliferation of cloud-native applications has intensified the need for robust security frameworks to counter Distributed Denial of Service (DDoS) attacks. This paper examines contemporary cloud-native security models, assessing their design principles, mechanisms, and efficacy in mitigating DDoS threats. Through a comparative review of six models, this research identifies key strengths and limitations, emphasizing the importance of scalability, automation, and machine learning in enhancing defense mechanisms. The findings provide a foundation for future advancements in cloud-native security.
References
Amazon Web Services. (2023). AWS Shield Documentation. Retrieved from AWS Official.
Microsoft Azure. (2023). DDoS Protection Overview. Retrieved from Azure Official.
Google Cloud Platform. (2023). Cloud Armor. Retrieved from GCP Official.
Bu, X., & Ling, X. (2021). Service Mesh-Based Security in Kubernetes. Journal of Cloud Security, 15(4), 210-220.
Smith, J., & Doe, A. (2022). Zero Trust Architectures for DDoS Mitigation. Cyber Defense Review, 10(2), 112-128.
Kishori Jadhav Shinde. (2023). The Role of Artificial Intelligence in Advancing Cloud-Based Data Science for Decision Making. JOURNAL OF RECENT TRENDS IN COMPUTER SCIENCE AND ENGINEERING (JRTCSE), 11(2), 30-36.
Chen, Y., & Patel, R. (2021). Evaluating Open-Source DDoS Mitigation. International Journal of Cloud Computing, 8(3), 45-67.
Smith, J., & Patel, R. (2021). A Review of Cloud-Native DDoS Mitigation Techniques. Journal of Cloud Security, 15(3), 45-62.
Zhao, L., & Lee, Y. (2022). Enhancing Scalability in AI-Driven DDoS Mitigation. International Journal of Cybersecurity, 20(1), 89-102.
Kumar, R., & Singh, P. (2023). Zero Trust Architectures for Resilient Cloud-Native Systems. Journal of Cyber Defense Strategies, 12(4), 33-48.
Robert Taylor. (2023). A Comprehensive Framework for Real-Time Anomaly Detection Using Data Science Techniques in Multi-Cloud Systems. Journal Of Recent Trends in Computer Science and Engineering (JRTCSE), 11(1), 46-51.
Ali, T., & Chen, Y. (2021). The Role of Threat Intelligence in Modern Cloud Security. Journal of Information Security, 18(2), 77-88.
Ramesh, P., & Taylor, S. (2023). Machine Learning in Cloud Security: A Critical Analysis. Journal of Artificial Intelligence in Security, 10(2), 56-72.
Bu, X., & Ling, Y. (2021). Kubernetes-Native Security: Challenges and Opportunities. In Proceedings of the International Conference on Cloud Computing Security (pp. 125-139). New York, USA.
Lin, M., & Zhang, L. (2022). Leveraging AI for Proactive DDoS Defense in Cloud-Native Architectures. In Proceedings of the 14th IEEE Cloud Security Conference (pp. 95-108). San Francisco, USA.
Sudhakar Babu S. (2024). Exploring the Role of Edge and Cloud Computing in Enhancing Data Analytics for IoT Ecosystems. Journal Of Recent Trends in Computer Science and Engineering (JRTCSE), 12(1), 27-33.
Patel, R., & Chen, Y. (2023). An Evaluation of Open-Source Security Solutions for Cloud-Native Applications. In Proceedings of the International Symposium on Cloud Security and Resilience (pp. 212-227). London, UK.
Smith, J., & Doe, A. (2022). Zero Trust Security in the Cloud Era: Principles and Practices. New York, NY: CyberPress Publications.
Johnson, K., & Ali, N. (2023). Defending Cloud-Native Applications: A Comprehensive Guide to DDoS Mitigation. San Francisco, CA: CloudSec Books.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Challa Naga Satya Sri Varshini (Author)
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.