A Taxonomy and Survey of Cloud Computing Systems, 2009 Fifth International Joint Conference on INC, IMS and IDC, pp.44-51, 2009. ,
DOI : 10.1109/NCM.2009.218
Network firewalls, IEEE Communications Magazine, vol.32, issue.9, pp.50-57, 1994. ,
DOI : 10.1109/35.312843
Towards a taxonomy of intrusion-detection systems, Computer Networks, vol.31, issue.8, pp.805-822, 1999. ,
DOI : 10.1016/S1389-1286(98)00017-6
State-of-the-art intrusion detection : Technology, challenges, and evaluation, 2005. ,
Dids (distributed intrusion detection system) -motivation, architecture, and an early prototype, Proceedings of the 14th National Computer Security Conference, pp.167-176, 1991. ,
An architecture for intrusion detection using autonomous agents, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217), pp.13-24, 1998. ,
DOI : 10.1109/CSAC.1998.738563
A survey of coordinated attacks and collaborative intrusion detection, Computers & Security, vol.29, issue.1, pp.124-140, 2010. ,
DOI : 10.1016/j.cose.2009.06.008
Large-Scale Coordinated attacks: Impact on the Cloud Security, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012. ,
DOI : 10.1109/IMIS.2012.76
URL : https://hal.archives-ouvertes.fr/hal-00723739
Nmap Network Scanning : The Official Nmap Project Guide to Network Discovery and Security Scanning. USA : Insecure, 2009. ,
Snort -lightweight intrusion detection for networks, Proceedings of the 13th USENIX conference on System administration, LISA '99, pp.229-238, 1999. ,
Distributed Evasive Scan Techniques and Countermeasures, Proceedings of the 4th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA '07, pp.157-174, 2007. ,
DOI : 10.1007/978-3-540-73614-1_10
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.141.4536