P. Barford, J. Kline, D. Plonka, and A. Ron, A signal analysis of network traffic anomalies, Proceedings of the second ACM SIGCOMM Workshop on Internet measurment , IMW '02, pp.71-82, 2002.
DOI : 10.1145/637201.637210

A. Lakhina, M. Crovella, and C. Diot, Mining Anomalies Using Traffic Feature Distributions, ACM SIGCOMM '05, pp.217-228, 2005.
DOI : 10.1145/1080091.1080118

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.116.4156

X. Li, F. Bian, M. Crovella, C. Diot, R. Govindan et al., Detection and identification of network anomalies using sketch subspaces, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, pp.147-152, 2006.
DOI : 10.1145/1177080.1177099

Y. Kanda, R. Fontugne, K. Fukuda, and T. Sugawara, ADMIRE: Anomaly detection method using entropy-based PCA with three-step sketches, Computer Communications, vol.36, issue.5, pp.575-588, 2013.
DOI : 10.1016/j.comcom.2012.12.002

G. Nychis, V. Sekar, D. G. Andersen, H. Kim, and H. Zhang, An empirical evaluation of entropy-based traffic anomaly detection, Proceedings of the 8th ACM SIGCOMM conference on Internet measurement conference, IMC '08, pp.151-156, 2008.
DOI : 10.1145/1452520.1452539

W. E. Leland, M. S. Taqqu, W. Willinger, and D. V. Wilson, On the self-similar nature of Ethernet traffic (extended version), IEEE/ACM Transactions on Networking, vol.2, issue.1, pp.1-15, 1994.
DOI : 10.1109/90.282603

P. Abry, R. Baraniuk, P. Flandrin, R. Riedi, and D. Veitch, Multiscale nature of network traffic, IEEE Signal Processing Magazine, vol.19, issue.3, pp.28-46, 2002.
DOI : 10.1109/79.998080

G. Dewaele, K. Fukuda, P. Borgnat, P. Abry, and K. Cho, Extracting hidden anomalies using sketch and non Gaussian multiresolution statistical detection procedures, Proceedings of the 2007 workshop on Large scale attack defense , LSAD '07, pp.145-152, 2007.
DOI : 10.1145/1352664.1352675

URL : https://hal.archives-ouvertes.fr/ensl-00177654

A. Scherrer, N. Larrieu, P. Owezarski, P. Borgnat, and P. Abry, Non-Gaussian and Long Memory Statistical Characterizations for Internet Traffic with Anomalies Dependable and Secure Computing, IEEE Transactions on, vol.4, issue.1, pp.56-70, 2007.
DOI : 10.1109/tdsc.2007.12

A. Lakhina, M. Crovella, and C. Diot, Diagnosing Network- Wide Traffic Anomalies, ACM SIGCOMM '04, pp.219-230, 2004.
DOI : 10.1145/1015467.1015492

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1838

F. Silveira, C. Diot, N. Taft, and R. Govindan, ASTUTE: Detecting a Different Class of Traffic Anomalies, ACM SIG- COMM ', vol.10, pp.267-278, 2010.

S. Muthukrishnan, Data Streams: Algorithms and Applications, ACM SIAM SODA '03, p.413, 2003.
DOI : 10.1561/0400000002

URL : http://ce.sharif.edu/courses/90-91/1/ce797-1/resources/root/Data_Streams_-_Algorithms_and_Applications.pdf

B. Krishnamurthy, S. Sen, Y. Zhang, and Y. Chen, Sketchbased Change Detection: Methods, Evaluation, and Applications, ACM IMC '03, pp.234-247, 2003.
DOI : 10.1145/948234.948236

H. Wendt, P. Abry, and S. Jaffard, Bootstrap for Empirical Multifractal Analysis, IEEE Signal Processing Magazine, vol.24, issue.4, pp.38-48, 2007.
DOI : 10.1109/MSP.2007.4286563

R. Fontugne, P. Borgnat, P. Abry, and K. Fukuda, MAW- ILab : Combining Diverse Anomaly Detectors for Automated Anomaly Labeling and Performance Benchmarking, ACM CoNEXT '10, 2010.

M. Thorup and Y. Zhang, Tabulation Based 4-Universal Hashing with Applications to Second Moment Estimation, ACM SIAM SODA '04, pp.615-624, 2004.
DOI : 10.1137/100800774

URL : http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.297.8114&rep=rep1&type=pdf

R. H. Riedi, M. S. Crouse, V. J. Ribeiro, and R. G. Baraniuk, A multifractal wavelet model with application to network traffic, IEEE Transactions on Information Theory, vol.45, issue.3, pp.992-1018, 1999.
DOI : 10.1109/18.761337

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.414.9140

N. Hohn, D. Veitch, and P. Abry, Multifractality in TCP/IP Traffic: the Case Against, Computer Network Journal, vol.48, pp.293-313, 2005.

S. Mallat, A Wavelet Tour of Signal Processing, 1998.

B. Castaing, Y. Gagne, and M. Marchand, Log-similarity for turbulent flows?, Physica D: Nonlinear Phenomena, vol.68, issue.3-4, pp.387-400, 1993.
DOI : 10.1016/0167-2789(93)90132-K

S. Jaffard, P. Abry, and H. Wendt, Irregularities and Scaling in Signal and Image Processing: Multifractal Analysis, Benoit Mandelbrot: A Life in Many Dimensions. World scientific publishing, 2014.
URL : https://hal.archives-ouvertes.fr/hal-00798427

K. Cho, K. Mitsuya, and A. Kato, Traffic Data Repository at the WIDE Project, USENIX 2000 Annual Technical Conference: FREENIX Track, pp.263-270, 2000.

R. Fontugne and K. Fukuda, A Hough-transform-based anomaly detector with an adaptive time interval, ACM SIGAPP Applied Computing Review, vol.11, issue.3, pp.41-51, 2011.
DOI : 10.1145/2034594.2034598

D. Brauckhoff, X. Dimitropoulos, A. Wagner, and K. Salamatian, Anomaly Extraction in Backbone Networks using Association Rules, ACM IMC '09, pp.28-34, 2009.
DOI : 10.1109/tnet.2012.2187306

URL : https://hal.archives-ouvertes.fr/hal-00527139

N. Hohn, D. Veitch, and P. Abry, Cluster processes: a natural language for network traffic, IEEE Transactions on Signal Processing, vol.51, issue.8, pp.2229-2244, 2003.
DOI : 10.1109/TSP.2003.814460

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.5.870

C. Rossow, Amplification Hell: Revisiting Network Protocols for DDoS Abuse, Proceedings 2014 Network and Distributed System Security Symposium, 2014.
DOI : 10.14722/ndss.2014.23233

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.693.910

J. Czyz, M. Kallitsis, M. Gharaibeh, C. Papadopoulos, M. Bailey et al., Taming the 800 Pound Gorilla, Proceedings of the 2014 Conference on Internet Measurement Conference, IMC '14
DOI : 10.1145/2663716.2663717

L. Quan, J. Heidemann, and Y. Pradkin, Trinocular: Understanding Internet Reliability Through Adaptive Probing, ACM SIGCOMM '13, pp.255-266, 2013.

J. Mazel, R. Fontugne, and K. Fukuda, A taxonomy of anomalies in backbone network traffic, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC), pp.30-36, 2014.
DOI : 10.1109/IWCMC.2014.6906328