R. V. Deshmukh and K. K. Devadkar, Understanding DDoS Attack & its Effect in Cloud Environment, Proc. ICAC3'15, 2015.

N. U. Shirazi, S. Simpson, A. K. Marnerides, M. Watson, A. Mauthe et al., Assessing the impact of intra-cloud live migration on anomaly detection, Proc. IEEE CloudNet'14, 2014.

, Suricata Open Source IDS Engine, p.2015

S. Roschke, F. Cheng, and C. Meinel, Intrusion Detection in the Cloud, Proc. IEEE DASC'09, 2009.

C. Mazzariello, R. Bifulco, and R. Canonico, Integrating a network IDS into an open source Cloud Computing environment, Proc. IAS'10, 2010.

M. Ficco, L. Tasquier, and R. Aversa, Intrusion Detection in Cloud Computing, Proc. 3PGCIC'13, 2013.

K. Kourai and K. Juda, Secure offloading of legacy idses using remote vm introspection in semi-trusted clouds, Proc. IEEE CLOUD'16, 2016.

A. Wailly, M. Lacoste, and H. Debar, VESPA: Multi-layered Selfprotection for Cloud Resources, Proc. ICAC'12, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00738174

, VMware NSX for vSphere Network Virtualization Design Guide ver 3.0, VMware, Tech. Rep, 2017.

, OVH Dedicated Servers, p.2017