A signal analysis of network traffic anomalies, Proceedings of the second ACM SIGCOMM Workshop on Internet measurment , IMW '02, pp.71-82, 2002. ,
DOI : 10.1145/637201.637210
Mining Anomalies Using Traffic Feature Distributions, ACM SIGCOMM '05, pp.217-228, 2005. ,
DOI : 10.1145/1080091.1080118
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.116.4156
Detection and identification of network anomalies using sketch subspaces, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, pp.147-152, 2006. ,
DOI : 10.1145/1177080.1177099
ADMIRE: Anomaly detection method using entropy-based PCA with three-step sketches, Computer Communications, vol.36, issue.5, pp.575-588, 2013. ,
DOI : 10.1016/j.comcom.2012.12.002
An empirical evaluation of entropy-based traffic anomaly detection, Proceedings of the 8th ACM SIGCOMM conference on Internet measurement conference, IMC '08, pp.151-156, 2008. ,
DOI : 10.1145/1452520.1452539
On the self-similar nature of Ethernet traffic (extended version), IEEE/ACM Transactions on Networking, vol.2, issue.1, pp.1-15, 1994. ,
DOI : 10.1109/90.282603
Multiscale nature of network traffic, IEEE Signal Processing Magazine, vol.19, issue.3, pp.28-46, 2002. ,
DOI : 10.1109/79.998080
Extracting hidden anomalies using sketch and non Gaussian multiresolution statistical detection procedures, Proceedings of the 2007 workshop on Large scale attack defense , LSAD '07, pp.145-152, 2007. ,
DOI : 10.1145/1352664.1352675
URL : https://hal.archives-ouvertes.fr/ensl-00177654
Non-Gaussian and Long Memory Statistical Characterizations for Internet Traffic with Anomalies Dependable and Secure Computing, IEEE Transactions on, vol.4, issue.1, pp.56-70, 2007. ,
DOI : 10.1109/tdsc.2007.12
Diagnosing Network- Wide Traffic Anomalies, ACM SIGCOMM '04, pp.219-230, 2004. ,
DOI : 10.1145/1015467.1015492
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1838
ASTUTE: Detecting a Different Class of Traffic Anomalies, ACM SIG- COMM ', vol.10, pp.267-278, 2010. ,
Data Streams: Algorithms and Applications, ACM SIAM SODA '03, p.413, 2003. ,
DOI : 10.1561/0400000002
URL : http://ce.sharif.edu/courses/90-91/1/ce797-1/resources/root/Data_Streams_-_Algorithms_and_Applications.pdf
Sketchbased Change Detection: Methods, Evaluation, and Applications, ACM IMC '03, pp.234-247, 2003. ,
DOI : 10.1145/948234.948236
Bootstrap for Empirical Multifractal Analysis, IEEE Signal Processing Magazine, vol.24, issue.4, pp.38-48, 2007. ,
DOI : 10.1109/MSP.2007.4286563
MAW- ILab : Combining Diverse Anomaly Detectors for Automated Anomaly Labeling and Performance Benchmarking, ACM CoNEXT '10, 2010. ,
Tabulation Based 4-Universal Hashing with Applications to Second Moment Estimation, ACM SIAM SODA '04, pp.615-624, 2004. ,
DOI : 10.1137/100800774
URL : http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.297.8114&rep=rep1&type=pdf
A multifractal wavelet model with application to network traffic, IEEE Transactions on Information Theory, vol.45, issue.3, pp.992-1018, 1999. ,
DOI : 10.1109/18.761337
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.414.9140
Multifractality in TCP/IP Traffic: the Case Against, Computer Network Journal, vol.48, pp.293-313, 2005. ,
A Wavelet Tour of Signal Processing, 1998. ,
Log-similarity for turbulent flows?, Physica D: Nonlinear Phenomena, vol.68, issue.3-4, pp.387-400, 1993. ,
DOI : 10.1016/0167-2789(93)90132-K
Irregularities and Scaling in Signal and Image Processing: Multifractal Analysis, Benoit Mandelbrot: A Life in Many Dimensions. World scientific publishing, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-00798427
Traffic Data Repository at the WIDE Project, USENIX 2000 Annual Technical Conference: FREENIX Track, pp.263-270, 2000. ,
A Hough-transform-based anomaly detector with an adaptive time interval, ACM SIGAPP Applied Computing Review, vol.11, issue.3, pp.41-51, 2011. ,
DOI : 10.1145/2034594.2034598
Anomaly Extraction in Backbone Networks using Association Rules, ACM IMC '09, pp.28-34, 2009. ,
DOI : 10.1109/tnet.2012.2187306
URL : https://hal.archives-ouvertes.fr/hal-00527139
Cluster processes: a natural language for network traffic, IEEE Transactions on Signal Processing, vol.51, issue.8, pp.2229-2244, 2003. ,
DOI : 10.1109/TSP.2003.814460
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.5.870
Amplification Hell: Revisiting Network Protocols for DDoS Abuse, Proceedings 2014 Network and Distributed System Security Symposium, 2014. ,
DOI : 10.14722/ndss.2014.23233
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.693.910
Taming the 800 Pound Gorilla, Proceedings of the 2014 Conference on Internet Measurement Conference, IMC '14 ,
DOI : 10.1145/2663716.2663717
Trinocular: Understanding Internet Reliability Through Adaptive Probing, ACM SIGCOMM '13, pp.255-266, 2013. ,
A taxonomy of anomalies in backbone network traffic, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC), pp.30-36, 2014. ,
DOI : 10.1109/IWCMC.2014.6906328