K. Park, G. Kim, and M. Crovella, On the Relationship between File Sizes, Transport Protocols, and Self-Similar Network Traffic, Proc. Int'l Conf. Network Protocols, p.171, 1996.

P. Abry, P. Barananiuk, R. Flandrin, D. Riedi, and . Veitch, Multiscale Network Traffic Analysis, Modeling, and Inference Using Wavelets, Multifractals, and Cascades, IEEE Signal Processing Magazine, vol.3, issue.19, pp.28-46, 2002.

A. Erramilli, O. Narayan, and W. Willinger, Experimental queueing analysis with long-range dependent packet traffic, IEEE/ACM Transactions on Networking, vol.4, issue.2, pp.209-223, 1996.
DOI : 10.1109/90.491008

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.35.7251

K. Park and W. Willinger, Self-Similar Network Traffic: An Overview Self-Similar Network Traffic and Performance Evaluation, pp.1-38, 2000.
DOI : 10.1002/047120644x.ch1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.41.9884

V. Paxson, Bro: a system for detecting network intruders in real-time, Computer Networks, vol.31, issue.23-24, pp.23-24, 1999.
DOI : 10.1016/S1389-1286(99)00112-7

J. Brutlag, Aberrant Behavior Detection in Time Series for Network Monitoring, Proc. USENIX System Administration Conf, 2000.

J. Hochberg, K. Jackson, C. Stallings, J. F. Mcclary, D. Dubois et al., NADIR: An automated system for detecting network intrusion and misuse, Computers & Security, vol.12, issue.3, pp.235-248, 1993.
DOI : 10.1016/0167-4048(93)90110-Q

H. Javits and A. Valdes, The SRI IDES statistical anomaly detector, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy, 1991.
DOI : 10.1109/RISP.1991.130799

H. S. Vaccaro and G. E. Liepins, Detection of anomalous computer session activity, Proceedings. 1989 IEEE Symposium on Security and Privacy, pp.280-289, 1989.
DOI : 10.1109/SECPRI.1989.36302

D. Moore, G. M. Voelker, and S. Savage, Inferring Internet Denialof-Service Activity, Proc. Usenix Security Symp, 2001.
DOI : 10.1145/1132026.1132027

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.21.6570

N. Ye, A Markov Chain Model of Temporal Behavior for Anomaly Detection, Proc. Workshop Information Assurance and Security, 2000.

S. Jin and D. Yeung, A Covariance Analysis Model for DDoS Attack Detection, Proc. IEEE Int'l Conf. Comm, 2004.

J. Yuan and K. Mills, DDoS Attack Detection and Wavelets, technical report, Nat'l Inst. of Standards and Technology, 2004.

A. Lakhina, M. Crovella, and C. Diot, Diagnosing Network-Wide Traffic Anomalies A Framework for Classifying Denial of Service Attacks, Proc. ACM SIGCOMM Proc. ACM SIGCOMM, 2003.

C. Cheng, H. T. Kung, and K. Tan, Use of spectral analysis in defense against DoS attacks, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE, 2002.
DOI : 10.1109/GLOCOM.2002.1189011

D. Veitch and P. Abry, A wavelet-based joint estimator of the parameters of long-range dependence, special issue on multiscale statistical signal analysis and its applications, pp.878-897, 1999.
DOI : 10.1109/18.761330

L. Li and G. Lee, DDoS Attack Detection and Wavelets, Proc. Int'l Conf. Computer Comm. and Networks, 2003.
DOI : 10.1109/icccn.2003.1284203

P. Barford, J. Kline, D. Plonka, and A. Ron, A signal analysis of network traffic anomalies, Proceedings of the second ACM SIGCOMM Workshop on Internet measurment , IMW '02, 2002.
DOI : 10.1145/637201.637210

J. Jung, B. Krishnamurthy, and M. Rabinovich, Flash crowds and denial of service attacks, Proceedings of the eleventh international conference on World Wide Web , WWW '02, 2002.
DOI : 10.1145/511446.511485

W. E. Leland, M. S. Taqqu, W. Willinger, and D. V. Wilson, On the self-similar nature of Ethernet traffic (extended version), IEEE/ACM Transactions on Networking, vol.2, issue.1, pp.1-15, 1994.
DOI : 10.1109/90.282603

J. , L. Véhel, and R. H. Riedi, Chapter Fractional Brownian Motion and Data Traffic Modeling: The Other End of the Spectrum, Proc. Fractals in Engineering '97, 1997.

J. Cleary, S. Donnelly, I. Graham, A. Mcgregor, and M. Pearson, Design Principles for Accurate Passive Measurement, Proc. Passive and Active Measurements Conf, 2000.

V. Paxon and S. Floyd, Wide area traffic: the failure of Poisson modeling, IEEE/ACM Transactions on Networking, vol.3, issue.3, pp.226-244, 1995.
DOI : 10.1109/90.392383

T. Karagiannis, M. Molle, M. Faloutsos, and A. Broido, A Non Stationary Poisson View of the Internet Traffic, Proc. IEEE INFOCOM, 2004.

A. Andersen and B. Nielsen, A Markovian Approach for Modelling Packet Traffic with Long Range Dependence, IEEE J. Selected Areas in Comm, vol.5, issue.16, pp.719-732, 1998.

M. Crouse, R. Riedi, V. Ribeiro, and R. Baraniuk, A multifractal wavelet model for positive processes, Proceedings of the IEEE-SP International Symposium on Time-Frequency and Time-Scale Analysis (Cat. No.98TH8380), 1998.
DOI : 10.1109/TFSA.1998.721430

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.37.5522

N. Desaulniers-soucy and A. Iuoras, Traffic modeling with universal multifractals, Seamless Interconnection for Universal Services. Global Telecommunications Conference. GLOBECOM'99. (Cat. No.99CH37042), 1999.
DOI : 10.1109/GLOCOM.1999.830278

N. Hohn, D. Veitch, and P. Abry, Multifractality in TCP/IP Traffic: The Case Against, Computer Networks J, 2005.

S. Sarvotham, R. Riedi, and R. Baraniuk, Connection-level analysis and modeling of network traffic, Proceedings of the First ACM SIGCOMM Workshop on Internet Measurement , IMW '01, 2001.
DOI : 10.1145/505202.505215

M. Taqqu, V. Teverosky, and W. Willinger, Is Network Traffic Self-Similar or Multifractal?, Fractals, vol.05, issue.01, pp.63-73, 1997.
DOI : 10.1142/S0218348X97000073

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.50.9141

Z. Zhang, V. Ribeiro, S. Moon, and C. Diot, Small-time scaling behaviors of Internet backbone traffic: an empirical study, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), 2003.
DOI : 10.1109/INFCOM.2003.1209205

K. Maulik and S. Resnick, The Self-Similar and Multifractral Nature of a Network Traffic Model, Stochastic Models, pp.549-577, 2003.

B. Melamed, An overview of TES processes and modeling methodology, Performance/SIGMETRICS Tutorials, pp.359-393, 1993.
DOI : 10.1007/BFb0013860

J. Beran, Statistics for Long-Memory Processes, 1994.

G. Samorodnitsky and M. Taqqu, Stable Non-Gaussian Random Processes, 1994.

B. Tsybakov and N. D. Georganas, Self-similar processes in communications networks, IEEE Transactions on Information Theory, vol.44, issue.5, pp.1713-1725, 1998.
DOI : 10.1109/18.705538

S. Paulo, V. Rui, and P. Antó-nio, Multiscale Fitting Procedure Using Markov Modulated Poisson Processes, Telecomm. Systems, vol.23, issue.12, pp.123-148, 2003.

I. Norros, On the use of fractional Brownian motion in the theory of connectionless networks, IEEE Journal on Selected Areas in Communications, vol.13, issue.6, 1995.
DOI : 10.1109/49.400651

N. Hohn, D. Veitch, and P. Abry, Cluster processes: a natural language for network traffic, IEEE Transactions on Signal Processing, vol.51, issue.8, pp.2229-2244, 2003.
DOI : 10.1109/TSP.2003.814460

C. Huang, M. Devetsikiotis, I. Lambadaris, and A. Kaye, Modeling and Simulation of Self-Similar Variable Bit Rate Compressed Video: A Unified Approach, Proc. ACM SIGCOMM, 1995.

S. B. Lowen, S. S. Cash, M. Poo, and M. C. Teich, Quantal Neurotransmitter Secretion Rate Exhibits Fractal Behavior, J. Neuroscience, vol.17, issue.15, pp.5666-5677, 1997.

A. Scherrer and P. Abry, Marginales non Gaussiennes et Longue Mémoire: Analyse et Synthèse de Trafic Internet, Colloque GRETSI-2005, 2005.

G. J. Hahn and S. S. Shapiro, Statistical Models in Engineering, Interscience Division), p.88, 1994.

S. Mallat, A Wavelet Tour of Signal Processing, 1999.

P. Abry, P. Flandrin, M. S. Taqqu, and D. Veitch, Wavelets for the Analysis, Estimation and Synthesis of Scaling Data Self-Similar Network Traffic and Performance Evaluation, 2000.

P. Abry and D. Veitch, Wavelet analysis of long-range-dependent traffic, IEEE Transactions on Information Theory, vol.44, issue.1, pp.2-15, 1998.
DOI : 10.1109/18.650984

L. Ljung, System Identification: Theory for the User, chapter 10, 1999.

S. Uhlig, O. Bonaventure, and C. Rapier, 3D-LD: A Graphical Wavelet-Based Method for Analyzing Scaling Processes, Proc. ITC Specialist Seminar, pp.329-336, 2003.

D. Veitch and P. Abry, A statistical test for the time constancy of scaling exponents, IEEE Transactions on Signal Processing, vol.49, issue.10, pp.2325-2334, 2001.
DOI : 10.1109/78.950788

D. Veitch, P. Abry, and M. S. Taqqu, ON THE AUTOMATIC SELECTION OF THE ONSET OF SCALING, Fractals, vol.11, issue.04, pp.377-390, 2003.
DOI : 10.1142/S0218348X03002099

S. Kandula, D. Katabi, M. Jacob, and A. Berger, Botz-4-Sale: Survicing Organized DDoS Attacks that Mimic Flash Crowds, Proc. USENIX' NSDI'05, 2005.

S. Farraposo, K. Boudaoud, L. Gallon, and P. Owezarski, Some Issues Raised by DoS Attacks and the TCP/IP Suite, Proc. Fourth Conf. Security and Network Architectures (SAR '05), 2005.
URL : https://hal.archives-ouvertes.fr/hal-00349447

M. Basseville, Distance measures for signal processing and pattern recognition, Signal Processing, vol.18, issue.4, pp.349-369, 1989.
DOI : 10.1016/0165-1684(89)90079-0

URL : https://hal.archives-ouvertes.fr/inria-00075657