P. Berezi´nskiberezi´nski, J. Pawelec, M. Ma?owidzki, and R. Piotrowski, Entropy-based internet traffic anomaly detection: A case study, Proceedings of the Ninth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX, Advances in Intelligent Systems and Computing, pp.47-58, 2014.

D. Brauckhoff, Network traffic anomaly detection and evaluation, ETH, 2010.

D. Brauckhoff, B. Tellenbach, A. Wagner, M. May, and A. Lakhina, Impact of packet sampling on anomaly detection metrics, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, pp.159-164, 2006.
DOI : 10.1145/1177080.1177101

V. Chandola, A. Banerjee, and V. Kumar, Anomaly detection, ACM Computing Surveys, vol.41, issue.3, pp.1-1558, 2009.
DOI : 10.1145/1541880.1541882

M. Chora´schora´s, R. Kozik, R. Piotrowski, J. Brzostek, and W. Ho?ubowicz, Network Events Correlation for Federated Networks Protection System, Lecture Notes in Computer Science, vol.6994, pp.100-111, 2011.
DOI : 10.1007/978-3-642-24755-2_9

J. Davis and M. Goadrich, The relationship between Precision-Recall and ROC curves, Proceedings of the 23rd international conference on Machine learning , ICML '06, pp.233-240, 2006.
DOI : 10.1145/1143844.1143874

X. Dimitropoulos, M. Stoecklin, P. Hurley, and A. Kind, The eternal sunshine of the sketch data structure, Computer Networks, vol.52, issue.17, pp.3248-3257, 2008.
DOI : 10.1016/j.comnet.2008.08.014

L. Fillatre, I. Nikiforov, P. Casas, and S. Vaton, Optimal volume anomaly detection in network traffic flows, Proceedings of the 16th European Signal Processing Conference, p.8, 2008.
URL : https://hal.archives-ouvertes.fr/hal-00540901

B. Jasiul, J. Sliwa, K. Gleba, and M. Szpyrka, Identification of malware activities with rules, Proceedings of the 2014 Federated Conference on Computer Science and Information Systems
DOI : 10.15439/2014F265

B. Jasiul, M. Szpyrka, and J. Sliwa, Malware Behavior Modeling with Colored Petri Nets, Computer Information Systems and Industrial Management Proceedings of the 13th IFIP TC8 International Conference CISIM 2014, 2014.
DOI : 10.2478/amcs-2014-0016

URL : https://hal.archives-ouvertes.fr/hal-01405661

A. Kind, M. P. Stoecklin, and X. Dimitropoulos, Histogram-based traffic anomaly detection, IEEE Transactions on Network and Service Management, vol.6, issue.2, pp.110-121, 2009.
DOI : 10.1109/TNSM.2009.090604

Y. Kopylova, D. Buell, C. T. Huang, and J. Janies, Mutual information applied to anomaly detection, Journal of Communications and Networks, vol.10, issue.1, pp.89-97, 2008.
DOI : 10.1109/JCN.2008.6388332

A. Lakhina, M. Crovella, and C. Diot, Mining anomalies using traffic feature distributions, Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM '05, pp.217-228, 2005.
DOI : 10.1145/1080091.1080118

G. Nychis, V. Sekar, D. G. Andersen, H. Kim, and H. Zhang, An empirical evaluation of entropy-based traffic anomaly detection, Proceedings of the 8th ACM SIGCOMM conference on Internet measurement conference, IMC '08, pp.151-156, 2008.
DOI : 10.1145/1452520.1452539

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.150.601

A. Renyi, Probability Theory. Dover Books on Mathematics Series, 1973.

A. Shiravi, H. Shiravi, M. Tavallaee, and A. Ghorbani, Toward developing a systematic approach to generate benchmark datasets for intrusion detection, Computers & Security, vol.31, issue.3, pp.357-374, 2012.
DOI : 10.1016/j.cose.2011.12.012

M. Szpyrka, B. Jasiul, K. Wrona, and F. Dziedzic, Telecommunications Networks Risk Assessment with Bayesian Networks, Computer Information Systems and Industrial Management Proceedings of the 12th IFIP TC8 International Conference CISIM 2013, pp.277-288, 2013.
DOI : 10.1007/978-3-642-40925-7_26

URL : https://hal.archives-ouvertes.fr/hal-01496074

B. Tellenbach, M. Burkhart, D. Schatzmann, D. Gugelmann, and D. Sornette, Accurate network anomaly classification with generalized entropy metrics, Computer Networks, vol.55, issue.15, pp.3485-3502, 2011.
DOI : 10.1016/j.comnet.2011.07.008

C. Tsallis and C. B. De-pesquisas-físicas, Possible generalization of Boltzmann-Gibbs statistics, Journal of Statistical Physics, vol.8, issue.1-2, 1987.
DOI : 10.1007/BF01016429

Y. Xiang, K. Li, and W. Zhou, Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics, IEEE Transactions on Information Forensics and Security, vol.6, issue.2, pp.426-437, 2011.
DOI : 10.1109/TIFS.2011.2107320