More than ever before, applications are being delivered via the cloud. This is probably apparent to anyone with a smartphone, who can acquire a new application and delete an old one without spending more than a minute of their time.

Mirroring the rise of cloud-based applications for personal use is the use of cloud-based services in the business realm. Not only do you have all those companies that provide the apps you use on a daily basis, there are also numerous companies that rely heavily on cloud applications to operate.

Such companies may have nothing to do with the cloud, aside from using it as a tool. They may be a retail outlet, in manufacturing or a shipping and receiving firm. Whatever the field, cloud-based applications are likely used by the business in some form or another.

The stream of information and capabilities that flow from the cloud to specific devices has, unfortunately, attracted that which critical pathways have always attracted; pirates. And just as the mariners of old sought to disrupt the most profitable trading routes across the sea, hackers have begun paying more attention to the cloud.

A common type of attack launched against cloud services is called a denial of service attack (DoS). This describes the act of overloading an application – or the full cloud infrastructure – with superfluous requests, thus disturbing all actual requests.

According to the Worldwide Infrastructure Security Report from Arbor Networks, 61% of data centres and cloud operators were targeted by DoS attacks in 2016. Of those targeted, 21% faced more than 50 attacks per month.

Not all of these attacks led to problems, nor did they impact the end-users of the associated cloud. But the numbers are rather alarming. And that’s why many cloud operators and third party companies are committing themselves to the defense of the cloud.

DoS protection can be acquired by users to preserve themselves, should the cloud they rely on come under attack. The cloud operators themselves have virtualized DoS protection as well, which allows them to nip the problem in the bud by detecting and eliminating false requests. 

The security measures being added in opposition of DoS attacks is helping to further strengthen the security of the already formidable cloud, and builds upon the trend of matching its safety with its usability.