Passive Remote Source NAT Detection Using Behavior Statistics Derived from NetFlow, Lecture Notes in Computer Science, vol.7943, p.148 ,
DOI : 10.1007/978-3-642-38998-6_18
URL : https://hal.archives-ouvertes.fr/hal-01489964
Network Anomaly Detection: Methods, Systems and Tools, IEEE Communications Surveys & Tutorials, vol.16, issue.1, pp.1-34, 2013. ,
DOI : 10.1109/SURV.2013.052213.00046
A Survey on Internet Traffic Identification, IEEE Communications Surveys & Tutorials, vol.11, issue.3, pp.37-52, 2009. ,
DOI : 10.1109/SURV.2009.090304
Mining semantic relations using NetFlow, 2008 3rd IEEE/IFIP International Workshop on Business-driven IT Management, pp.110-111, 2008. ,
DOI : 10.1109/BDIM.2008.4540082
Unsupervised host behavior classification from connection patterns, International Journal of Network Management, vol.28, issue.9, pp.317-337, 2010. ,
DOI : 10.1002/nem.750
URL : https://hal.archives-ouvertes.fr/ensl-00488248
Cleaning Your House First: Shifting the Paradigm on How to Secure Networks, Proceedings of the 5th International Conference on Autonomous Infrastructure, Management, and Security: Managing the Dynamics of Networks and Services, pp.1-12, 2011. ,
DOI : 10.1007/978-3-642-21484-4_1
YAF: Yet Another Flowmeter, Proceedings of the 24th international conference on Large installation system administration. pp. 1? 16. LISA'10, USENIX Association, 2010. ,
Internet traffic classification demystified, Proceedings of the 2008 ACM CoNEXT Conference on, CONEXT '08, pp.1-11, 2008. ,
DOI : 10.1145/1544012.1544023
Netflow based system for NAT detection, Proceedings of the 5th international student workshop on Emerging networking experiments and technologies, Co-Next Student Workshop '09, 2009. ,
DOI : 10.1145/1658997.1659010
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.186.7929
Passive network forensics, ACM SIGOPS Operating Systems Review, vol.42, issue.3, pp.99-111, 2008. ,
DOI : 10.1145/1368506.1368520
Cybermetrics: User Identification through Network Flow Analysis, Lecture Notes in Computer Science, vol.6155, pp.167-170, 2010. ,
DOI : 10.1007/978-3-642-13986-4_24
URL : https://hal.archives-ouvertes.fr/hal-01056631
The need for simulation in evaluating anomaly detectors, ACM SIGCOMM Computer Communication Review, vol.38, issue.1, pp.55-59, 2008. ,
DOI : 10.1145/1341431.1341443
Cost-based modeling for fraud and intrusion detection: results from the JAM project, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00, pp.130-144, 2000. ,
DOI : 10.1109/DISCEX.2000.821515
Credit Scoring and Its Applications, Society for Industrial and Applied Mathematics, 2002. ,
DOI : 10.1137/1.9780898718317
Design and Evaluation of HTTP Protocol Parsers for IPFIX Measurement, Advances in Communication Networking, pp.136-147, 2013. ,
DOI : 10.1007/978-3-642-40552-5_13
URL : https://hal.archives-ouvertes.fr/hal-01497010