Sketch based anomaly detection, identification and performance evaluation, IEEE/IPSJ SAINT Measurement Workshop, 2007. ,
DOI : 10.1109/saint-w.2007.55
URL : https://hal.archives-ouvertes.fr/ensl-00175474
A signal analysis of network traffic anomalies, Proceedings of the second ACM SIGCOMM Workshop on Internet measurment , IMW '02, pp.71-82, 2002. ,
DOI : 10.1145/637201.637210
Distance measures for signal processing and pattern recognition, Signal Processing, vol.18, issue.4, pp.349-369, 1989. ,
DOI : 10.1016/0165-1684(89)90079-0
URL : https://hal.archives-ouvertes.fr/inria-00075657
Détection d'attaques de dénis de service par un modèle non gaussien multirésolution, CFIP-2006, pp.303-314, 2006. ,
Aberrant behavior detection in time series for network monitoring, USENIX System Administration Conference, 2000. ,
Use of spectral analysis in defense against DoS attacks, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE, pp.2031-2035, 2002. ,
DOI : 10.1109/GLOCOM.2002.1189011
Traffic data repository at the WIDE project, USENIX FREENIX Track, 2000. ,
A non-intrusive, wavelet-based approach to detecting network performance problems, IMW, pp.213-227, 2001. ,
A framework for classifying denial of service attacks, Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications , SIGCOMM '03, pp.99-110, 2003. ,
DOI : 10.1145/863955.863968
A covariance analysis model for DDoS attack detection, ICC, pp.1882-1886, 2004. ,
Flash crowds and denial of service attacks, Proceedings of the eleventh international conference on World Wide Web , WWW '02, pp.293-304, 2002. ,
DOI : 10.1145/511446.511485
Packetscore: A statistics-based packet filtering scheme against distributed denial-of-service attacks, IEEE Trans. Depend. Secur. Comput, vol.3, issue.2, pp.141-155, 2006. ,
Sketch-based change detection, Proceedings of the 2003 ACM SIGCOMM conference on Internet measurement , IMC '03, pp.234-247, 2003. ,
DOI : 10.1145/948205.948236
Diagnosing network-wide traffic anomalies, SIGCOMM, pp.219-230, 2004. ,
DOI : 10.1145/1015467.1015492
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1838
Detection and identification of network anomalies using sketch subspaces, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, pp.147-152, 2006. ,
DOI : 10.1145/1177080.1177099
A taxonomy of DDoS attack and DDoS defense mechanisms, ACM SIGCOMM Computer Communication Review, vol.34, issue.2, pp.39-53, 2004. ,
DOI : 10.1145/997150.997156
Inferring Internet denial-of-service activity, Usenix Security Symposium, pp.9-22, 2001. ,
DOI : 10.1145/1132026.1132027
Data Streams: Algorithms and Applications, SODA, p.413, 2003. ,
DOI : 10.1561/0400000002
Manifold learning visualization of network traffic data, Proceeding of the 2005 ACM SIGCOMM workshop on Mining network data , MineNet '05, pp.191-196, 2005. ,
DOI : 10.1145/1080173.1080182
Non-Gaussian and Long Memory Statistical Characterizations for Internet Traffic with Anomalies, IEEE Transactions on Dependable and Secure Computing, vol.4, issue.1, pp.56-70, 2007. ,
DOI : 10.1109/TDSC.2007.12
URL : https://hal.archives-ouvertes.fr/hal-00685248
Combining filtering and statistical methods for anomaly detection, Proceedings of the 5th ACM SIGCOMM conference on Internet measurement , IMC '05, pp.331-344, 2005. ,
DOI : 10.1145/1330107.1330147
URL : https://hal.archives-ouvertes.fr/hal-01489028
Tabulation based 4-universal hashing with applications to second moment estimation, SODA, pp.615-624, 2004. ,
Network anomography, Proceedings of the 5th ACM SIGCOMM conference on Internet measurement , IMC '05, pp.317-330, 2005. ,
DOI : 10.1145/1330107.1330146