Subramaniam, T. and Bethany, D. (2016) Preventing Distributed Denial of Service Attacks in Cloud Environments. International Journal of Information Technology, Control and Automation, 6, 23-32. https://doi.org/10.5121/ijitca.2016.6203
 Sivamohan, S., Veeramani, R., Liza, K., Krishnaveni, S. and Jothi, B. (2016) Data Mining Technique for DDoS Attack in Cloud Computing. International Journal of Computer Technology and Applications, 9, 149-156.
 Bonquet, A. and Martine, B. (2017) A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defense in Cloud Computing. Future Internet, 9, 1-9.
 Kaur, A. and Anupama, K. (2015) A Review on Various Attack Detection Techniques in Cloud Architecture. International Journal of Advanced Research in Computer Engineering & Technology, 4, 3861-3867.
 Kene, S.G. and Deepti, P.T. (2015) A Review on Intrusion Detection Techniques for Cloud Computing and Security Challenges. 2nd International Conference on Electronics and Communication Systems, Coimbatore, 26-27 Februaty 2015, Vol. 2, 227-231.
 Sattar, I., et al. (2015) A Review of Techniques to Detect and Prevent Distributed Denial of Service (DDoS) Attack in Cloud Computing Environment. International Journal of Computer Applications, 115, 23-27.
 Modi, C., Dhiren, P., Bhavesh, B., Avi, P. and Muttukrishnan, R. (2013) A Survey on Security Issues and Solutions at Different Layers of Cloud Computing. The Journal of Supercomputing, 63, 561-592. https://doi.org/10.1007/s11227-012-0831-5
 Dewal, P., et al. (2016) A Survey of Intrusion Detection Systems and Secure Routing Protocols in Wireless Sensor Networks. International Journal for Research in Emerging Science and Technology, 3, 16-20.
 Modi, K. and Abdul, Q. (2014) Detection and Prevention of DDoS Attacks on the Cloud using Double-TCP Mechanism and HMM-Based Architecture. International Journal of Cloud Computing and Services Science, 3, 113-120.
 Girma, A., et al. (2015) Analysis of DDoS Attacks and an Introduction of a Hybrid Statistical Model to Detect DDoS Attacks on Cloud Computing Environment. 12th International Conference on Information Technology—New Generations, Las Vegas, 13-15 April 2015, 212-217.
 Iyengar, N. and Gopinath, G. (2015) Trilateral Trust Based Defense Mechanism against DDoS Attacks in Cloud Computing Environment. Cybernetics and Information Technologies, 15, 122.
 Al-Hemairy, M., et al. (2009) Towards More Sophisticated ARP Spoofing Detection/Prevention Systems in LAN Networks. International Conference on the Current Trends in Information Technology, Dubai, 15-16 December 2009, 1-6.
 Jeyanthi, N. and Chris, M. (2014) A Virtual Firewall Mechanism using Army Nodes to Protect Cloud Infrastructure from DDoS Attacks. Cybernetics and Information Technologies, 14, 71-85.
 Singh, N., et al. (2015) Comprehensive Study of Various Techniques for Detecting DDoS Attacks in Cloud Environment. International Journal of Grid and Distributed Computing, 8, 119-126.
 Gayatri, P., et al. (2015) Comprehensive Comparative Study on Intrusion Detection System in Cloud Computing. International Journal for Research in Applied Science & Engineering Technology, 3, 926-930.
 Dastjerdi, A.V., et al. (2009) Distributed Intrusion Detection in Clouds using Mobile Agents. 3rd International Conference on Advanced Engineering Computing and Applications in Sciences, Sliema, 11-16 October 2009, 175-180.
 Sahardi, R.M. and Vahid, G. (2013) New Approach to Mitigate XML-DOS and HTTP-DOS Attacks for Cloud Computing. International Journal of Computer Applications, 72, 27-31.
 Patel, S. and Fenil, K. (2016) A Review Paper of an Encryption Scheme using Network Coding for Energy Optimization in MANET. International Conference on Wireless Communications, Signal Processing and Networking, Chennai, 23-25 March 2016, Vol. 34, 45-67.
 Chen, Z., Xu, G., Mahalingam, V., Ge, L., Nguyen, J., Yu, W. and Lu, C. (2016) A Cloud Computing Based Network Monitoring and Threat Detection System for Critical Infrastructures. Big Data Research, 3, 10-23.
 Osanaiye, O., Choo, K.R. and Dlodlo, M. (2016) Distributed Denial of Service (DDoS) Resilience in Cloud: Review and Conceptual Cloud DDoS Mitigation Framework. Journal of Network and Computer Applications, 67, 147-165.
 Cepheli, O., Buyukcorak, S. and Kurt, K.G. (2016) Hybrid Intrusion Detection System for DDoS Attacks. Journal of Electrical and Computer Engineering, 2016, Article ID: 1075648.
 Korad, S., Kadam, S., Deore, P., Jadhav, M. and Patil, R. (2016) Detection of Distributed Denial of Service Attack with Hadoop on Live Network. International Journal of Innovative Research in Computer and Communication Engineering, 4, 92-98.
 Veetil, S. and Gao, Q. (2014) Real-Time Network Intrusion Detection using Hadoop-Based Bayesian Classifier. In: Akhgar, B. and Arabnia, H.R., Eds., Emerging Trends in ICT Security, Elsevier Inc., 281-299.
 Singh, K., Guntuku, S.C., Thakur, A. and Hota, C. (2014) Big Data Analytics Framework for Peer-to-Peer Botnet Detection using Random Forests. Information Sciences, 278, 488-497.
 Jia, B., Ma, Y., Huang, X., Lin, Z. and Sun, Y. (2016) A Novel Real-Time DDoS Attack Detection Mechanism Based on MDRA Algorithm in Big Data. Mathematical Problems in Engineering, 2016, Article ID: 1467051.
 Jin, W. and Yu, Z. (2016) The Analysis of Information System Security Issue Based on Economics. International Conference on Information Engineering and Communications Technology, Kunming, 21-22 2016.
 Prasad, K.M., Reddy, R.A. and Rao, K.V. (2014) DoS and DDoS Attacks: Defense, Detection and Traceback Mechanisms—A Survey. Global Journal of Computer Science and Technology: E Network Web & Security, 14, 16-32.