R. B. Specht, I. Lee, and . Pdcs, A Taxonomy of DDoS Attacks and Defense Mechanisms [3] Design principles for accurate passive measurement, Passive and Active Measurements (PAM2000), pp.543-550, 2000.

L. Analyse-spectrale-d-'outils-classiques-de-ddos and J. Gallon, [6] Internet traffic characterisation ? an analysis of traffic oscillations, Colloque sur les Risques et la Sécurité d'Internet et des Systèmes (CRISIS05) th IEEE International Conference on High Speed Networks and Multimedia Communications, 2004.

P. Borgnat, N. Larrieu, P. Abry, and P. Owezarski, [11] IPERF, The TCP/UDP bandwith Measurement Tool http The DoS Project's " Trinoo " distributed denial of service attack tool http, Détection d'attaques dè`Déni de Service" : ruptures dans les statistiques du trafic Colloque GRETSI-05] Somme issues raised by Dos attacks and the TCP/IP suite, S.Farraposo, K.Boudaoud, L.Gallon, P.Owezarski, SAR'2005, p.2, 2005.

J. Hussain, C. Heidemann, . Papadopoulos, S. In, G. D. Karlsruhe et al., Inferring Internet Denial-of-Service activity, On the relationship between file sizes, transport protocols, and self-similar network traffic, Crovella, International Conference on Network Protocols, p.171, 1996.

. Assurance, W. Security, and . Point, Diagnosing Network-Wide Traffic Anomalies A signal analysis of network traffic anomalies, A. Lakhina, M. Crovella, C. Diot, SIGCOMM ACM/SIGCOMM Internet Measurement Workshop, vol.2021, 2000.

R. P. Lippmann, R. K. Cunningham, D. J. Fried, I. Graf, K. R. Kendall et al., Zissman, slides presented at RAID 1999 Conférence, Traffic Classification using Clustering Algorithms, J.Erman, M.Arlitt, A.Mahanti, SIGCOMM'06, 1998.

M. Workshop, ]. Nlanr-project, and I. Auckland, html [26] DARPA Intrusion Detection Data sets, http://www.ll.mit, 29] Low-Rate TCP-Targeted Denial of Service Attacks?The Shrew vs. the Mice and Elephants, A. Kuzmanovic, E. W. Knightly, SIGCOMM 2003, 2003.

Y. Chen and K. Hwang, Special Issue on Security in Grids and Distributed Systems Prefixpreserving IP address anonymization: Measurement-based security evaluation and a new cryptography-based scheme, 10th IEEE International Conference on Network Protocols, 2002.