This document discusses security techniques to protect cloud environments from DDoS attacks. It begins by introducing the importance of securing cloud resources and data availability. It then describes several common security attacks on cloud computing including cookie poisoning, SQL injection, man-in-the-middle attacks, and cloud malware injection. The document also examines intrusion detection methods like installing detection systems on cloud servers. Finally, it provides details on specific DDoS attacks like SYN flooding and IP spoofing, and the challenges they pose to cloud availability.