TY - JOUR KW - Agents KW - Cloud Computing KW - Attack AU - Abdelali Saidi AU - Elmehdi Bendriss AU - Ali Kartit AU - Mohamed El Marraki AB - Security in cloud computing is the ultimate question that every potential user studies before adopting it. Among the important points that the provider must ensure is that the Cloud will be available anytime the consumer tries to access it. Generally, the Cloud is accessible via the Internet, what makes it subject to a large variety of attacks. Today, the most striking cyber-attacks are the flooding DoS and its variant DDoS. This type of attacks aims to break down the availability of a service to its legitimate clients. In this paper, we underline the most used techniques to stand up against DoS flooading attacks in the Cloud. IS - Special Issue on Advances and Applications in the Internet of Things and Cloud Computing M1 - 3 N2 - Security in cloud computing is the ultimate question that every potential user studies before adopting it. Among the important points that the provider must ensure is that the Cloud will be available anytime the consumer tries to access it. Generally, the Cloud is accessible via the Internet, what makes it subject to a large variety of attacks. Today, the most striking cyber-attacks are the flooding DoS and its variant DDoS. This type of attacks aims to break down the availability of a service to its legitimate clients. In this paper, we underline the most used techniques to stand up against DoS flooading attacks in the Cloud. PY - 2017 SP - 75 EP - 78 T2 - International Journal of Interactive Multimedia and Artificial Intelligence TI - Techniques to Detect DoS and DDoS Attacks and an Introduction of a Mobile Agent System to Enhance it in Cloud Computing UR - http://www.ijimai.org/journal/sites/default/files/files/2016/08/ijimai20174_3_12_pdf_18434.pdf VL - 4 SN - 1989-1660 ER -