Review Article
Big Data: Survey, Technologies, Opportunities, and Challenges
Table 6
DoS attack approaches.
| Defense strategy | Objectives | Pros | Cons |
| Defense against the new DoS attack [102] | Detects the new type of DoS | (i) Prevents the bandwidth degradation (ii) Ensures availability of service | Unavailability of the service during application migration |
| FRC attack detection [102] | Detects the FRC attack | No bandwidth wastage | (i) Cannot always identify the attacker (ii) Does not advise the victim on appropriate action |
|
|