1. Inayat, Z., Gani, A., Anuar, N., Anwar, S., Khan, M.: Cloud-based intrusion detection and response system: open research issues, and solutions. Arab. J. Sci. Eng. 42, 399–423 (2017)
2. Zargar, S., Joshi, J., Tipper, D.: A survey of defense mechanisms against distributed denial of service (DDos) flooding attacks. IEEE Commun. Surv. Tut. 15, 2046–2069 (2013)
3. Boroojeni, K., Amini, M., Iyengar, S.: Cloud network data security. In: Smart Grids: Security and Privacy Issues, pp. 71–82 (2017)
4. Kumar, V., Kumar, K.: Classification of DDOS attack tools and its handling techniques and strategy at application layer. In: 2016 2nd International Conference on Advances in Computing, Communication, & Automation (ICACCA)(Fall), pp. 1–6 (2016)
5. Panda, B., Pradhan, M., Pradhan, G.S., Kumar, M., Singh, M.: Intrusion prevention system. Netw. Secur. Attacks Countermeasures