. Cisco and . Com, Cisco ios netflow configuration guide, release 12, 2010.

J. Quittek, T. Zseby, B. Claise, and S. Zander, Requirements for IP Flow Information Export (IPFIX), RFCInformational), vol.3917, 2004.
DOI : 10.17487/rfc3917

A. Sperotto, G. Scha?rath, R. Sadre, C. Morariu, A. Pras et al., An Overview of IP Flow-Based Intrusion Detection, IEEE Communications Surveys & Tutorials, vol.12, issue.3, pp.343-356, 2010.
DOI : 10.1109/SURV.2010.032210.00054

A. Sperotto, M. R. Mandjes, R. Sadre, P. T. De-boer, and A. Pras, Autonomic Parameter Tuning of Anomaly-Based IDSs: an SSH Case Study, IEEE Transactions on Network and Service Management, vol.9, issue.2, pp.128-141, 2012.
DOI : 10.1109/TNSM.2012.031512.110146

M. Mandjes and P. Zuraniewski, transience, and its applications to overload detection, Performance Evaluation, vol.68, issue.6, pp.507-527, 2011.
DOI : 10.1016/j.peva.2011.01.008

L. Nussbaum, P. Neyron, and O. Richard, On Robust Covert Channels Inside DNS, of IFIP Advances in Information and Communication Technology, pp.51-62, 2009.
DOI : 10.1007/11767831_10

URL : https://hal.archives-ouvertes.fr/inria-00425616

M. Aiello, A. Merlo, and G. Papaleo, Performance assessment and analysis of DNS tunneling tools, Logic Journal of IGPL, vol.21, issue.4, 2012.
DOI : 10.1093/jigpal/jzs029

M. Crotti, M. Dusi, F. Gringoli, and L. Salgarelli, Detecting HTTP Tunnels with Statistical Mechanisms, 2007 IEEE International Conference on Communications, pp.6162-6168, 2007.
DOI : 10.1109/ICC.2007.1020

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.408.8479

M. Dusi, M. Crotti, F. Gringoli, and L. Salgarelli, Tunnel Hunter: Detecting application-layer tunnels with statistical fingerprinting, Computer Networks, vol.53, issue.1, pp.81-97, 2009.
DOI : 10.1016/j.comnet.2008.09.010

S. Marchal, J. Francois, C. Wagner, R. State, A. Dulaunoy et al., DNSSM: A large scale passive DNS security monitoring framework, 2012 IEEE Network Operations and Management Symposium, pp.988-993, 2012.
DOI : 10.1109/NOMS.2012.6212019

URL : https://hal.archives-ouvertes.fr/hal-00749243

A. Karasaridis, K. Meier-hellstern, and D. Hoeflin, NIS04-2: Detection of DNS Anomalies using Flow Data Analysis, IEEE Globecom 2006, pp.1-6, 2006.
DOI : 10.1109/GLOCOM.2006.280

C. Callegari, A. Coluccia, A. D-'alconzo, W. Ellens, S. Giordano et al., A Methodological Overview on Anomaly Detection
DOI : 10.1007/978-3-642-36784-7_7

B. Brodsky and B. Darkhovsky, Nonparametric methods in change-point problems, of Mathematics and Its Applications, 1993.
DOI : 10.1007/978-94-015-8163-9

A. Kolmogorov, On the empirical determination of a distribution law, Selected Works of A.N. Kolmogorov. Volume II: Probability Theory and Mathematical Statistics, pp.139-146, 1933.