(. M. Basseville, Distance measures for signal processing and pattern recognition, Signal Processing, vol.18, issue.4, pp.349-369, 1989.
DOI : 10.1016/0165-1684(89)90079-0

URL : https://hal.archives-ouvertes.fr/inria-00075657

(. J. Beran, Statistics for Long-memory processes, 1994.

(. J. Brutlag, Aberrant behavior detection in time series for network monitoring, USENIX System Administration Conference, pp.139-146, 2000.

(. Cheng, (. H. Kung, and (. Tan, Use of spectral analysis in defense against DoS attacks, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE, pp.2143-2148, 2002.
DOI : 10.1109/GLOCOM.2002.1189011

(. M. Grossglauser and (. J. Bolot, On the relevance of long-range dependence in network traffic, ACM SIGCOMM, pp.15-24, 1996.
URL : https://hal.archives-ouvertes.fr/inria-00073861

(. G. Hahn and (. S. Shapiro, Statistical Models in Engineering, Interscience Division), vol.88, 1994.

(. S. Jin and (. Yeung, A covariance analysis model for DDoS attack detection, IEEE International Conference on Communications, pp.1882-1886, 2004.

P. Borgnat, P. Abry, G. Dewaele, A. Scherrer, N. Larrieu et al., DDoS attack detection and wavelets, International Conference on computer communications and networks, pp.421-427, 2003.

(. Ljung, System identification : theory for the user, chapter 10, 1999.

(. D. Moore, (. G. Voelker, and (. S. Savage, Inferring Internet denial-of-service activity, Usenix Security Symposium, pp.9-22, 2001.
DOI : 10.1145/1132026.1132027

(. Norros, On the use of fractional Brownian motion in the theory of connectionless networks, IEEE Journal on Selected Areas in Communications, vol.13, issue.6, pp.953-962, 1995.
DOI : 10.1109/49.400651

(. K. Park and (. W. Willinger, Self-Similar Network Traffic: An Overview, Self-Similar Network Traffic and Performance Evaluation, pp.1-38, 2000.
DOI : 10.1002/047120644X.ch1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.41.9884

(. V. Paxon and (. S. Floyd, Wide area traffic: the failure of Poisson modeling, IEEE/ACM Transactions on Networking, vol.3, issue.3, pp.226-244, 1995.
DOI : 10.1109/90.392383

(. Paxson, Bro: a system for detecting network intruders in real-time, Computer Networks, vol.31, issue.23-24, pp.23-242435, 1999.
DOI : 10.1016/S1389-1286(99)00112-7

(. H. Vaccaro and (. G. Liepins, Detection of anomalous computer session activity, Proceedings. 1989 IEEE Symposium on Security and Privacy, pp.280-289, 1989.
DOI : 10.1109/SECPRI.1989.36302