Entropy-based internet traffic anomaly detection: A case study, Proceedings of the Ninth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX, Advances in Intelligent Systems and Computing, pp.47-58, 2014. ,
Network traffic anomaly detection and evaluation, ETH, 2010. ,
Impact of packet sampling on anomaly detection metrics, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, pp.159-164, 2006. ,
DOI : 10.1145/1177080.1177101
Anomaly detection, ACM Computing Surveys, vol.41, issue.3, pp.1-1558, 2009. ,
DOI : 10.1145/1541880.1541882
Network Events Correlation for Federated Networks Protection System, Lecture Notes in Computer Science, vol.6994, pp.100-111, 2011. ,
DOI : 10.1007/978-3-642-24755-2_9
The relationship between Precision-Recall and ROC curves, Proceedings of the 23rd international conference on Machine learning , ICML '06, pp.233-240, 2006. ,
DOI : 10.1145/1143844.1143874
The eternal sunshine of the sketch data structure, Computer Networks, vol.52, issue.17, pp.3248-3257, 2008. ,
DOI : 10.1016/j.comnet.2008.08.014
Optimal volume anomaly detection in network traffic flows, Proceedings of the 16th European Signal Processing Conference, p.8, 2008. ,
URL : https://hal.archives-ouvertes.fr/hal-00540901
Identification of malware activities with rules, Proceedings of the 2014 Federated Conference on Computer Science and Information Systems ,
DOI : 10.15439/2014F265
Malware Behavior Modeling with Colored Petri Nets, Computer Information Systems and Industrial Management Proceedings of the 13th IFIP TC8 International Conference CISIM 2014, 2014. ,
DOI : 10.2478/amcs-2014-0016
URL : https://hal.archives-ouvertes.fr/hal-01405661
Histogram-based traffic anomaly detection, IEEE Transactions on Network and Service Management, vol.6, issue.2, pp.110-121, 2009. ,
DOI : 10.1109/TNSM.2009.090604
Mutual information applied to anomaly detection, Journal of Communications and Networks, vol.10, issue.1, pp.89-97, 2008. ,
DOI : 10.1109/JCN.2008.6388332
Mining anomalies using traffic feature distributions, Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM '05, pp.217-228, 2005. ,
DOI : 10.1145/1080091.1080118
An empirical evaluation of entropy-based traffic anomaly detection, Proceedings of the 8th ACM SIGCOMM conference on Internet measurement conference, IMC '08, pp.151-156, 2008. ,
DOI : 10.1145/1452520.1452539
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.150.601
Probability Theory. Dover Books on Mathematics Series, 1973. ,
Toward developing a systematic approach to generate benchmark datasets for intrusion detection, Computers & Security, vol.31, issue.3, pp.357-374, 2012. ,
DOI : 10.1016/j.cose.2011.12.012
Telecommunications Networks Risk Assessment with Bayesian Networks, Computer Information Systems and Industrial Management Proceedings of the 12th IFIP TC8 International Conference CISIM 2013, pp.277-288, 2013. ,
DOI : 10.1007/978-3-642-40925-7_26
URL : https://hal.archives-ouvertes.fr/hal-01496074
Accurate network anomaly classification with generalized entropy metrics, Computer Networks, vol.55, issue.15, pp.3485-3502, 2011. ,
DOI : 10.1016/j.comnet.2011.07.008
Possible generalization of Boltzmann-Gibbs statistics, Journal of Statistical Physics, vol.8, issue.1-2, 1987. ,
DOI : 10.1007/BF01016429
Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics, IEEE Transactions on Information Forensics and Security, vol.6, issue.2, pp.426-437, 2011. ,
DOI : 10.1109/TIFS.2011.2107320