The project would entail setting up a physical, private cloud and public cloud environment. Then, a denial of service attack would be performed and closely monitored to measure the effect it had on each environment in order to compare them. This would allow patterns to be shown as well as any differences between simulate and real data.