Traceroute anomalies: Detection and prevention in internet graphs, Computer Networks, vol.52, 2008. ,
A signal analysis of network traffic anomalies, Proceedings of the second ACM SIGCOMM Workshop on Internet measurment , IMW '02, 2002. ,
DOI : 10.1145/637201.637210
Approaches in anomaly-based intrusion detection systems, 1st Benelux Workshop on Information and System Security, 2006. ,
POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection System, Fourth IEEE International Workshop on Information Assurance (IWIA'06), 2006. ,
DOI : 10.1109/IWIA.2006.18
Seven Years and One Day: Sketching the Evolution of Internet Traffic, IEEE INFOCOM 2009, The 28th Conference on Computer Communications, 2009. ,
DOI : 10.1109/INFCOM.2009.5061979
URL : https://hal.archives-ouvertes.fr/ensl-00290756
Aberrant behavior detection in time series for network monitoring, LISA '00: Proceedings of the 14th USENIX conference on System administration, pp.139-146, 2000. ,
Anomaly detection, ACM Computing Surveys, vol.41, issue.3, 2009. ,
DOI : 10.1145/1541880.1541882
The origin of power laws in internet topologies revisited, 2002. ,
Power-Law Distributions in Empirical Data, SIAM Review, vol.51, issue.4, pp.661-703, 2009. ,
DOI : 10.1137/070710111
Parameter Estimation for Scientists and Engineers by Adriaan van den Bos, International Statistical Review, vol.75, issue.3, pp.436-437, 2007. ,
DOI : 10.1111/j.1751-5823.2007.00030_29.x
What are the best concentric descriptors for complex networks?, New Journal of Physics, vol.9, p.311, 2007. ,
Extracting hidden anomalies using sketch and non Gaussian multiresolution statistical detection procedures, Proceedings of the 2007 workshop on Large scale attack defense , LSAD '07, 2007. ,
DOI : 10.1145/1352664.1352675
URL : https://hal.archives-ouvertes.fr/ensl-00177654
Maximum Likelihood Estimation: Logic and Practice, 1993. ,
Metrics for power spectra: An axiomatic approach, IEEE Transactions on Signal Processing, vol.57, issue.3, pp.859-867, 2009. ,
Testing for Normality, 1980. ,
Practical issues with using network tomography for fault diagnosis, ACM SIGCOMM Computer Communication Review, vol.38, issue.5, pp.53-58, 2008. ,
DOI : 10.1145/1452335.1452343
URL : https://hal.archives-ouvertes.fr/hal-01151795
The most recent version is available at, 1989. ,
Sketch-based change detection, Proceedings of the 2003 ACM SIGCOMM conference on Internet measurement , IMC '03, 2003. ,
DOI : 10.1145/948205.948236
Characterizing network events and their impact on routing, CoNEXT, p.59, 2007. ,
URL : https://hal.archives-ouvertes.fr/hal-01334996
Origins of Internet routing instability, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320), pp.218-226, 1999. ,
DOI : 10.1109/INFCOM.1999.749286
Visualizing Internet Routing Changes, IEEE Transactions on Visualization and Computer Graphics, vol.12, issue.6, 2006. ,
DOI : 10.1109/TVCG.2006.108
Diagnosing Network-Wide Traffic Anomalies, Proceedings of ACM SIGCOMM '04, 2004. ,
A Radar for the Internet, 2008 IEEE International Conference on Data Mining Workshops, 2009. ,
DOI : 10.1109/ICDMW.2008.121
URL : https://hal.archives-ouvertes.fr/inria-00382496
Detection and identification of network anomalies using sketch subspaces, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, 2006. ,
DOI : 10.1145/1177080.1177099
Towards realistic modeling of IP-level routing topology dynamics, Networking Science, vol.5, issue.5, 2013. ,
DOI : 10.1007/s13119-013-0023-5
URL : https://hal.archives-ouvertes.fr/hal-00690403
Fast dynamics in internet topology: preliminary observations and explanations, Fourth International Conference on Internet Monitoring and Protection, 2009. ,
URL : https://hal.archives-ouvertes.fr/hal-01298128
Impact of power-law topology on IP-level routing dynamics: Simulation results, 2012 Proceedings IEEE INFOCOM Workshops, 2012. ,
DOI : 10.1109/INFCOMW.2012.6193495
URL : https://hal.archives-ouvertes.fr/hal-01217947
Streamlining traceroute by estimating path lengths, 2004 IEEE International Workshop on IP Operations and Management, 2004. ,
DOI : 10.1109/IPOM.2004.1547603
Observing the evolution of internet as topology, ACM SIGCOMM Computer Communication Review, vol.37, issue.4, pp.313-324, 2007. ,
DOI : 10.1145/1282427.1282416
Local and dynamic analysis of internet multicast router topology, Annales des télécommunications, vol.62, pp.408-425, 2007. ,
Privacy-preserving payload-based correlation for accurate malicious traffic detection, Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense, LSAD '06, pp.99-106, 2006. ,
Comparing static and dynamic measurements and models of the internet's AS topology, Proc. IEEE Infocom, 2004. ,
End-to-end Internet packet dynamics, IEEE/ACM Transactions on Networking, vol.7, issue.3, pp.277-292, 1999. ,
DOI : 10.1109/90.779192
Numerical Recipes: The Art of Scientific Computing, 1992. ,
Non-Gaussian and Long Memory Statistical Characterizations for Internet Traffic with Anomalies, IEEE Transactions on Dependable and Secure Computing, vol.4, issue.1, pp.56-70, 2007. ,
DOI : 10.1109/TDSC.2007.12
URL : https://hal.archives-ouvertes.fr/hal-00685248
Identification of Outliers, 2002. ,
All of Statistics: A Concise Course in Statistical Inference, 2005. ,
DOI : 10.1007/978-0-387-21736-9