B. Augustin, X. Cuvellier, B. Orgogozo, F. Viger, T. Friedman et al., Traceroute anomalies: Detection and prevention in internet graphs, Computer Networks, vol.52, 2008.

P. Barford, J. Kline, D. Plonka, and A. Ron, A signal analysis of network traffic anomalies, Proceedings of the second ACM SIGCOMM Workshop on Internet measurment , IMW '02, 2002.
DOI : 10.1145/637201.637210

D. Bolzoni and S. Etalle, Approaches in anomaly-based intrusion detection systems, 1st Benelux Workshop on Information and System Security, 2006.

D. Bolzoni, S. Etalle, and P. Hartel, POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection System, Fourth IEEE International Workshop on Information Assurance (IWIA'06), 2006.
DOI : 10.1109/IWIA.2006.18

P. Borgnat, G. Dewaele, K. Fukuda, P. Abry, and K. Cho, Seven Years and One Day: Sketching the Evolution of Internet Traffic, IEEE INFOCOM 2009, The 28th Conference on Computer Communications, 2009.
DOI : 10.1109/INFCOM.2009.5061979

URL : https://hal.archives-ouvertes.fr/ensl-00290756

J. D. Brutlag, Aberrant behavior detection in time series for network monitoring, LISA '00: Proceedings of the 14th USENIX conference on System administration, pp.139-146, 2000.

V. Chandola, A. Banerjee, and V. Kumar, Anomaly detection, ACM Computing Surveys, vol.41, issue.3, 2009.
DOI : 10.1145/1541880.1541882

Q. Chen, H. Chang, R. Govindan, S. Jamin, S. J. Shenker et al., The origin of power laws in internet topologies revisited, 2002.

A. Clauset, C. R. Shalizi, and M. E. Newman, Power-Law Distributions in Empirical Data, SIAM Review, vol.51, issue.4, pp.661-703, 2009.
DOI : 10.1137/070710111

M. J. Crowder, Parameter Estimation for Scientists and Engineers by Adriaan van den Bos, International Statistical Review, vol.75, issue.3, pp.436-437, 2007.
DOI : 10.1111/j.1751-5823.2007.00030_29.x

L. Da, F. Costa, and R. F. Andrade, What are the best concentric descriptors for complex networks?, New Journal of Physics, vol.9, p.311, 2007.

G. Dewaele, K. Fukuda, P. Borgnat, P. Abry, and K. Cho, Extracting hidden anomalies using sketch and non Gaussian multiresolution statistical detection procedures, Proceedings of the 2007 workshop on Large scale attack defense , LSAD '07, 2007.
DOI : 10.1145/1352664.1352675

URL : https://hal.archives-ouvertes.fr/ensl-00177654

R. Scott, M. Eliason, and . Beck, Maximum Likelihood Estimation: Logic and Practice, 1993.

T. Tryphon, J. Georgiou, M. Karlsson, and . Takyar, Metrics for power spectra: An axiomatic approach, IEEE Transactions on Signal Processing, vol.57, issue.3, pp.859-867, 2009.

D. Hawkins, Testing for Normality, 1980.

Y. Huang, N. Feamster, and R. Teixeira, Practical issues with using network tomography for fault diagnosis, ACM SIGCOMM Computer Communication Review, vol.38, issue.5, pp.53-58, 2008.
DOI : 10.1145/1452335.1452343

URL : https://hal.archives-ouvertes.fr/hal-01151795

V. Jacobson and . Traceroute, The most recent version is available at, 1989.

B. Krishnamurty, S. Sen, Y. Zhang, and Y. Chen, Sketch-based change detection, Proceedings of the 2003 ACM SIGCOMM conference on Internet measurement , IMC '03, 2003.
DOI : 10.1145/948205.948236

A. Medem-kuatse, R. Teixeira, and M. Meulle, Characterizing network events and their impact on routing, CoNEXT, p.59, 2007.
URL : https://hal.archives-ouvertes.fr/hal-01334996

C. Labovitz, G. R. Malan, and F. Jahanian, Origins of Internet routing instability, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320), pp.218-226, 1999.
DOI : 10.1109/INFCOM.1999.749286

M. Lad, D. Massey, and L. Zhang, Visualizing Internet Routing Changes, IEEE Transactions on Visualization and Computer Graphics, vol.12, issue.6, 2006.
DOI : 10.1109/TVCG.2006.108

A. Lakhina, M. Crovella, and C. Diot, Diagnosing Network-Wide Traffic Anomalies, Proceedings of ACM SIGCOMM '04, 2004.

M. Latapy, C. Magnien, and F. Ouédraogo, A Radar for the Internet, 2008 IEEE International Conference on Data Mining Workshops, 2009.
DOI : 10.1109/ICDMW.2008.121

URL : https://hal.archives-ouvertes.fr/inria-00382496

X. Li, M. F. Bian, C. Crovella, R. Diot, A. Govindan et al., Detection and identification of network anomalies using sketch subspaces, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, 2006.
DOI : 10.1145/1177080.1177099

C. Magnien, A. Medem, S. Kirgizov, and F. Tarissan, Towards realistic modeling of IP-level routing topology dynamics, Networking Science, vol.5, issue.5, 2013.
DOI : 10.1007/s13119-013-0023-5

URL : https://hal.archives-ouvertes.fr/hal-00690403

C. Magnien, F. Ouédraogo, G. Valadon, and M. Latapy, Fast dynamics in internet topology: preliminary observations and explanations, Fourth International Conference on Internet Monitoring and Protection, 2009.
URL : https://hal.archives-ouvertes.fr/hal-01298128

A. Medem, C. Magnien, and F. Tarissan, Impact of power-law topology on IP-level routing dynamics: Simulation results, 2012 Proceedings IEEE INFOCOM Workshops, 2012.
DOI : 10.1109/INFCOMW.2012.6193495

URL : https://hal.archives-ouvertes.fr/hal-01217947

T. Moors, Streamlining traceroute by estimating path lengths, 2004 IEEE International Workshop on IP Operations and Management, 2004.
DOI : 10.1109/IPOM.2004.1547603

R. V. Oliveira, B. Zhang, and L. Zhang, Observing the evolution of internet as topology, ACM SIGCOMM Computer Communication Review, vol.37, issue.4, pp.313-324, 2007.
DOI : 10.1145/1282427.1282416

J. Pansiot, Local and dynamic analysis of internet multicast router topology, Annales des télécommunications, vol.62, pp.408-425, 2007.

J. Janak, K. Parekh, S. J. Wang, and . Stolfo, Privacy-preserving payload-based correlation for accurate malicious traffic detection, Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense, LSAD '06, pp.99-106, 2006.

S. Park, D. M. Pennock, and C. L. Giles, Comparing static and dynamic measurements and models of the internet's AS topology, Proc. IEEE Infocom, 2004.

V. Paxson, End-to-end Internet packet dynamics, IEEE/ACM Transactions on Networking, vol.7, issue.3, pp.277-292, 1999.
DOI : 10.1109/90.779192

H. William, S. A. Press, W. T. Teukolsky, B. P. Vetterling, and . Flannery, Numerical Recipes: The Art of Scientific Computing, 1992.

A. Scherrer, N. Larrieu, P. Owezarski, P. Borgnat, and P. Abry, Non-Gaussian and Long Memory Statistical Characterizations for Internet Traffic with Anomalies, IEEE Transactions on Dependable and Secure Computing, vol.4, issue.1, pp.56-70, 2007.
DOI : 10.1109/TDSC.2007.12

URL : https://hal.archives-ouvertes.fr/hal-00685248

C. Henry, . Jr, and . Thode, Identification of Outliers, 2002.

L. Wasserman, All of Statistics: A Concise Course in Statistical Inference, 2005.
DOI : 10.1007/978-0-387-21736-9