B. Rimal, E. Choi, and I. Lumb, A Taxonomy and Survey of Cloud Computing Systems, 2009 Fifth International Joint Conference on INC, IMS and IDC, pp.44-51, 2009.
DOI : 10.1109/NCM.2009.218

S. Bellovin and W. Cheswick, Network firewalls, IEEE Communications Magazine, vol.32, issue.9, pp.50-57, 1994.
DOI : 10.1109/35.312843

H. Debar, M. Dacier, and A. Wespi, Towards a taxonomy of intrusion-detection systems, Computer Networks, vol.31, issue.8, pp.805-822, 1999.
DOI : 10.1016/S1389-1286(98)00017-6

. Peddisetty, State-of-the-art intrusion detection : Technology, challenges, and evaluation, 2005.

S. R. Snapp, S. R. Snapp, J. Brentano, G. V. Dias, T. L. Goan et al., Dids (distributed intrusion detection system) -motivation, architecture, and an early prototype, Proceedings of the 14th National Computer Security Conference, pp.167-176, 1991.

J. Balasubramaniyan, J. Garcia-fernandez, D. Isacoff, E. Spafford, and D. Zamboni, An architecture for intrusion detection using autonomous agents, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217), pp.13-24, 1998.
DOI : 10.1109/CSAC.1998.738563

C. V. Zhou, C. Leckie, and S. Karunasekera, A survey of coordinated attacks and collaborative intrusion detection, Computers & Security, vol.29, issue.1, pp.124-140, 2010.
DOI : 10.1016/j.cose.2009.06.008

D. Riquet, G. Grimaud, and M. Hauspie, Large-Scale Coordinated attacks: Impact on the Cloud Security, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012.
DOI : 10.1109/IMIS.2012.76

URL : https://hal.archives-ouvertes.fr/hal-00723739

G. F. Lyon, Nmap Network Scanning : The Official Nmap Project Guide to Network Discovery and Security Scanning. USA : Insecure, 2009.

M. Roesch, Snort -lightweight intrusion detection for networks, Proceedings of the 13th USENIX conference on System administration, LISA '99, pp.229-238, 1999.

M. G. Kang, J. Caballero, and D. Song, Distributed Evasive Scan Techniques and Countermeasures, Proceedings of the 4th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA '07, pp.157-174, 2007.
DOI : 10.1007/978-3-540-73614-1_10

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.141.4536