P. Abry, P. Borgnat, and G. Dewaele, Sketch based anomaly detection, identification and performance evaluation, IEEE/IPSJ SAINT Measurement Workshop, 2007.
DOI : 10.1109/saint-w.2007.55

URL : https://hal.archives-ouvertes.fr/ensl-00175474

P. Barford, J. Kline, D. Plonka, and A. Ron, A signal analysis of network traffic anomalies, Proceedings of the second ACM SIGCOMM Workshop on Internet measurment , IMW '02, pp.71-82, 2002.
DOI : 10.1145/637201.637210

M. Basseville, Distance measures for signal processing and pattern recognition, Signal Processing, vol.18, issue.4, pp.349-369, 1989.
DOI : 10.1016/0165-1684(89)90079-0

URL : https://hal.archives-ouvertes.fr/inria-00075657

P. Borgnat, Détection d'attaques de dénis de service par un modèle non gaussien multirésolution, CFIP-2006, pp.303-314, 2006.

J. Brutlag, Aberrant behavior detection in time series for network monitoring, USENIX System Administration Conference, 2000.

C. Cheng, H. Kung, and K. Tan, Use of spectral analysis in defense against DoS attacks, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE, pp.2031-2035, 2002.
DOI : 10.1109/GLOCOM.2002.1189011

K. Cho, K. Mitsuya, and A. Kato, Traffic data repository at the WIDE project, USENIX FREENIX Track, 2000.

P. Huang, A. Feldmann, and W. Willinger, A non-intrusive, wavelet-based approach to detecting network performance problems, IMW, pp.213-227, 2001.

A. Hussain, J. Heidemann, and C. Papadopoulos, A framework for classifying denial of service attacks, Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications , SIGCOMM '03, pp.99-110, 2003.
DOI : 10.1145/863955.863968

S. Jin and D. Yeung, A covariance analysis model for DDoS attack detection, ICC, pp.1882-1886, 2004.

J. Jung, B. Krishnamurthy, and M. Rabinovich, Flash crowds and denial of service attacks, Proceedings of the eleventh international conference on World Wide Web , WWW '02, pp.293-304, 2002.
DOI : 10.1145/511446.511485

Y. Kim, W. C. Lau, M. C. Chuah, and H. J. Chao, Packetscore: A statistics-based packet filtering scheme against distributed denial-of-service attacks, IEEE Trans. Depend. Secur. Comput, vol.3, issue.2, pp.141-155, 2006.

B. Krishnamurty, S. Sen, Y. Zhang, and Y. Chen, Sketch-based change detection, Proceedings of the 2003 ACM SIGCOMM conference on Internet measurement , IMC '03, pp.234-247, 2003.
DOI : 10.1145/948205.948236

A. Lakhina, M. Crovella, and C. Diot, Diagnosing network-wide traffic anomalies, SIGCOMM, pp.219-230, 2004.
DOI : 10.1145/1015467.1015492

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1838

X. Li, F. Bian, M. Crovella, C. Diot, R. Govindan et al., Detection and identification of network anomalies using sketch subspaces, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, pp.147-152, 2006.
DOI : 10.1145/1177080.1177099

J. Mirkovic and P. Reiher, A taxonomy of DDoS attack and DDoS defense mechanisms, ACM SIGCOMM Computer Communication Review, vol.34, issue.2, pp.39-53, 2004.
DOI : 10.1145/997150.997156

D. Moore, G. Voelker, and S. Savage, Inferring Internet denial-of-service activity, Usenix Security Symposium, pp.9-22, 2001.
DOI : 10.1145/1132026.1132027

S. Muthukrishnan, Data Streams: Algorithms and Applications, SODA, p.413, 2003.
DOI : 10.1561/0400000002

N. Patwari and A. Hero, Manifold learning visualization of network traffic data, Proceeding of the 2005 ACM SIGCOMM workshop on Mining network data , MineNet '05, pp.191-196, 2005.
DOI : 10.1145/1080173.1080182

A. Scherrer, N. Larrieu, P. Owezarski, P. Borgnat, and P. Abry, Non-Gaussian and Long Memory Statistical Characterizations for Internet Traffic with Anomalies, IEEE Transactions on Dependable and Secure Computing, vol.4, issue.1, pp.56-70, 2007.
DOI : 10.1109/TDSC.2007.12

URL : https://hal.archives-ouvertes.fr/hal-00685248

A. Soule, K. Salamatian, and N. Taft, Combining filtering and statistical methods for anomaly detection, Proceedings of the 5th ACM SIGCOMM conference on Internet measurement , IMC '05, pp.331-344, 2005.
DOI : 10.1145/1330107.1330147

URL : https://hal.archives-ouvertes.fr/hal-01489028

M. Thorup and Y. Zhang, Tabulation based 4-universal hashing with applications to second moment estimation, SODA, pp.615-624, 2004.

Y. Zhang, Z. Ge, A. Greenberg, and M. Roughan, Network anomography, Proceedings of the 5th ACM SIGCOMM conference on Internet measurement , IMC '05, pp.317-330, 2005.
DOI : 10.1145/1330107.1330146