. Van-assche, H. Anneleen, and . Blockeel, Seeing the Forest Through the Trees: Learning a Comprehensible Model from an Ensemble, Machine Learning: ECML 2007, pp.418-429, 2007.
DOI : 10.1007/978-3-540-74958-5_39

K. Bartos and M. Rehak, Trust-based solution for robust self-configuration of distributed intrusion detection systems, pp.121-126, 2012.

B. Jerzy, J. Stefanowski, and L. Idkowiak, Extending bagging for imbalanced data, pp.269-278, 2013.

L. Breiman, Random forests, Machine Learning, vol.45, issue.1, pp.5-32, 2001.
DOI : 10.1023/A:1010933404324

I. Umang-kamalakar-chaudhary, M. Papapanagiotou, and . Devetsikiotis, Flow classification using clustering and association rule mining, Computer Aided Modeling, Analysis and Design of Communication Links and Networks (CA- MAD) 15th IEEE International Workshop on, pp.76-80, 2010.

C. Chen, A. Liaw, and L. Breiman, Using random forest to learn imbalanced data, 2004.

B. Claise, Cisco systems netflow services export version 9, 2004.
DOI : 10.17487/rfc3954

M. Reda, . Elbasiony, A. Elsayed, . Sallam, E. Tarek et al., A hybrid network intrusion detection framework based on random forests and weighted k-means, Ain Shams Engineering Journal, vol.4, issue.4, pp.753-762, 2013.

M. Fernández-delgado, E. Cernadas, S. Barro, and D. Amorim, Do we need hundreds of classifiers to solve real world classification problems?, The Journal of Machine Learning Research, vol.15, issue.1, pp.3133-3181, 2014.

M. Te, V. Huang, and . Kecman, Semi-supervised learning from unbalanced labeled data?an improvement, Knowledge-Based Intelligent Information and Engineering Systems, pp.802-808, 2004.

H. Jiang, W. Andrew, Z. Moore, S. Ge, J. Jin et al., Lightweight application classification for network management, Proceedings of the 2007 SIGCOMM workshop on Internet network management , INM '07, pp.299-304, 2007.
DOI : 10.1145/1321753.1321771

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.131.4362

T. Karagiannis, K. Papagiannaki, and M. Faloutsos, BLINC, ACM SIGCOMM Computer Communication Review, vol.35, issue.4, pp.229-240, 2005.
DOI : 10.1145/1090191.1080119

S. Shehroz, . Khan, G. Michael, and . Madden, A survey of recent trends in one class classification, In Artificial Intelligence and Cognitive Science, pp.188-197, 2010.

P. Laskov, P. Düssel, C. Schäfer, and K. Rieck, Learning Intrusion Detection: Supervised or Unsupervised?, pp.50-57, 2005.
DOI : 10.1007/11553595_6

K. Leung and C. Leckie, Unsupervised anomaly detection in network intrusion detection using clusters, pp.333-342, 2005.

J. Mchugh, Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory, ACM Transactions on Information and System Security, vol.3, issue.4, pp.262-294, 2000.
DOI : 10.1145/382912.382923

M. Mizutani, K. Takeda, and J. Murai, Behavior rule based intrusion detection, Proceedings of the 5th international student workshop on Emerging networking experiments and technologies, Co-Next Student Workshop '09, pp.57-58, 2009.
DOI : 10.1145/1658997.1659028

A. Adetunmbi, . Olusola, S. Adeola, . Oladele, O. Daramola et al., Analysis of kdd99 intrusion detection dataset for selection of relevance features, Proceedings of the World Congress on Engineering and Computer Science, pp.20-22, 2010.

R. Perdisci, G. Gu, and W. Lee, Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems, Sixth International Conference on Data Mining (ICDM'06), pp.488-498, 2006.
DOI : 10.1109/ICDM.2006.165

T. Pevn´ypevn´y, D. Andrew, and . Ker, The challenges of rich features in universal steganalysis, 2013.

M. Rehak, M. Pechoucek, P. Celeda, J. Novotny, and P. Minarik, Camnep: agent-based network intrusion detection system, pp.133-136, 2008.

M. Rehak, M. Pechoucek, M. G. Stiborek, K. Barto?, and P. Celeda, Adaptive Multiagent System for Network Traffic Monitoring, IEEE Intelligent Systems, vol.24, issue.3, pp.16-25, 2009.
DOI : 10.1109/MIS.2009.42

D. Rossi and S. Valenti, Fine-grained traffic classification with netflow data, Proceedings of the 6th International Wireless Communications and Mobile Computing Conference on ZZZ, IWCMC '10, pp.479-483, 2010.
DOI : 10.1145/1815396.1815507

C. So-in, A survey of network traffic monitoring and analysis tools. Cse 576m computer system analysis project, 2009.

A. Sperotto, G. Schaffrath, R. Sadre, C. Morariu, A. Pras et al., An Overview of IP Flow-Based Intrusion Detection, IEEE Communications Surveys & Tutorials, vol.12, issue.3, pp.343-356, 2010.
DOI : 10.1109/SURV.2010.032210.00054

M. Tavallaee, E. Bagheri, W. Lu, and A. Ghorbani, A detailed analysis of the KDD CUP 99 data set, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009.
DOI : 10.1109/CISDA.2009.5356528

C. Tsai, Y. Hsu, C. Lin, and W. Lin, Intrusion detection by machine learning: A review, Expert Systems with Applications, vol.36, issue.10, pp.11994-12000, 2009.
DOI : 10.1016/j.eswa.2009.05.029

J. Zhang, M. Zulkernine, and A. Haque, Random-Forests-Based Network Intrusion Detection Systems, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), vol.38, issue.5, pp.649-659, 2008.
DOI : 10.1109/TSMCC.2008.923876