J. Leyden, Conficker botnet growth slows at 10m infections. The Register 26, p.9, 2009.

S. Chapman, Massive 2 Million PCs Botnet Uncovered, ComputerworldUK, vol.23, issue.4, p.9, 2009.

E. Van-buskirk, Facebook Confirms Denial-of-Service Attack. Wired, 2009.

E. Nakashima, B. Krebs, and B. Harden, South Korea Targeted in Swarm Of Internet Attacks, The Washington Post, vol.9, issue.70907, 2009.

B. White, L. Stoller, R. Ricci, S. Guruprasad, M. Newbold et al., An Integrated Experimental Environment for Distributed Systems and Networks, Proc. of the Fifth Symposium on Operating Systems Design and Implementation, pp.255-270, 2002.

H. Lam, C. Li, S. T. Chanson, and D. Yeung, A Coordinated Detection and Response Scheme for Distributed Denial-of-Service Attacks, 2006 IEEE International Conference on Communications, pp.2165-2170, 2006.
DOI : 10.1109/ICC.2006.255091

W. J. Blackert, D. M. Gregg, A. K. Castner, E. M. Kyle, R. L. Hom et al., Analyzing interaction between distributed denial of service attacks and mitigation technologies, Proceedings DARPA Information Survivability Conference and Exposition, pp.26-36, 2003.
DOI : 10.1109/DISCEX.2003.1194870

R. Chertov, S. Fahmy, and N. B. Shroff, Emulation versus Simulation: A Case Study TCP-Targeted Denial of Service Attacks, 2nd International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2006. TRIDENTCOM 2006., pp.315-325, 2006.
DOI : 10.1109/TRIDNT.2006.1649164

T. Benzel, R. Braden, D. Kim, C. Neuman, A. Joseph et al., Experience with deter: a testbed for security research, 2nd International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2006. TRIDENTCOM 2006., pp.378-388, 2006.
DOI : 10.1109/TRIDNT.2006.1649172

J. Mircovic, P. Reiher, R. Thomas, and S. Schwab, Automating DDoS Experimentation, Proceedings of the DETER workshop, 2007.

R. Bolla and R. Bruschi, RFC 2544 Performance Evaluation for a Linux Based Open Router, Proc. of the 2006 IEEE Workshop on High Performance Switching and Routing, pp.9-14, 2006.

J. Yu, H. Lee, M. Kim, and D. Park, Traffic flooding attack detection with SNMP MIB using SVM, Computer Communications, vol.31, issue.17, pp.4212-4219, 2008.
DOI : 10.1016/j.comcom.2008.09.018

J. Mircovic, A. Hussain, S. Fahmy, P. Reiher, and R. K. Thomas, Accurately Measuring Denial of Service in Simulation and Testbed Experiments, IEEE Transactions on Dependable and Secure Computing, vol.6, issue.2, pp.81-95, 2009.
DOI : 10.1109/TDSC.2008.73

T. Bray, J. Paoli, C. M. Sperberg-mcqueen, E. Maler, and F. Yergeau, Extensible Markup Language (XML) 1.0 (Fifth Edition), 2008.

A. Botta, A. Dainotti, and A. Pescapè, Multi-protocol and multi-platform traffic generation and measurement, INFOCOM 2007 DEMO Session, 2007.

B. Shneidermann, Designing the user interface strategies for effective human-computer interaction, ACM SIGBIO Newsletter, vol.9, issue.1, 1998.
DOI : 10.1145/25065.950626