Research Article
A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the Cloud
Table 1
A summary of related works.
| Approach | Problem | Target cloud | Limitations |
| Relay networks | Client filtration | No | Requires thorough client identification |
| Cloud MTD | Client registration and shuffling | Yes | Requires thorough client identification or proof-of-work |
| Proof-of-work schemes | Client bootstrapping | No | Requires solution of computationally intensive puzzles |
| Content distribution networks | Client bootstrapping | Yes | Requires solution of computationally intensive puzzles or a large network |
|
|