Real-time Analysis of Flow Data for Network Attack Detection, 2007 10th IFIP/IEEE International Symposium on Integrated Network Management, pp.100-108, 2007. ,
DOI : 10.1109/INM.2007.374774
NEMEA: A framework for network traffic analysis, 2016 12th International Conference on Network and Service Management (CNSM), pp.195-201, 2016. ,
DOI : 10.1109/CNSM.2016.7818417
An Active Splitter Architecture for Intrusion Detection and Prevention, IEEE Transactions on Dependable and Secure Computing, vol.3, issue.1, pp.31-44, 2006. ,
DOI : 10.1109/TDSC.2006.6
Snort -lightweight intrusion detection for networks, Proceedings of the 13th USENIX Conference on System Administration. LISA '99, pp.229-238, 1999. ,
A scalable distributed ids architecture for high speed networks, In: IJCSNS International Journal of Computer Science and Network Security, vol.98, p.Citeseer, 2009. ,
An Efficient Hash-Based Load Balancing Scheme to Support Parallel NIDS, Computational Science and Its Applications -ICCSA 2011 -International Conference Proceedings, Part I, pp.537-549, 2011. ,
DOI : 10.1109/TNET.2005.852881
The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware, Recent Advances in Intrusion Detection: 10th International Symposium, pp.107-126, 2007. ,
DOI : 10.1007/978-3-540-74320-0_6
URL : https://digital.library.unt.edu/ark:/67531/metadc902683/m2/1/high_res_d/935341.pdf
Bro: a system for detecting network intruders in real-time, Computer Networks, vol.31, issue.23-24, pp.23-24, 1999. ,
DOI : 10.1016/S1389-1286(99)00112-7
URL : http://www.cs.utexas.edu/~yzhang/teaching/cs386m-s8/Readings/bro99.pdf
Hashdoop: A MapReduce framework for network anomaly detection, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2014. ,
DOI : 10.1109/INFCOMW.2014.6849281
Impact of packet sampling on portscan detection, IEEE Journal on Selected Areas in Communications, vol.24, issue.12, pp.2285-2298, 2006. ,
Towards Efficient Flow Sampling Technique for Anomaly Detection, Proceedings of the 4th International Conference on Traffic Monitoring and Analysis. TMA'12, pp.93-106, 2012. ,
DOI : 10.1109/INFCOM.2007.207
Analysis of Vertical Scans Discovered by Naive Detection, Management and Security in the Age of Hyperconnectivity: 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, pp.165-169, 2016. ,
DOI : 10.1109/.2006.1629454
URL : https://hal.archives-ouvertes.fr/hal-01632742
Flow Information Storage Assessment Using IPFIXcol, Proceedings of the 6th IFIP WG 6.6 International Autonomous Infrastructure, Management , and Security Conference on Dependable Networks and Services. AIMS'12, pp.155-158, 2012. ,
DOI : 10.1007/978-3-642-30633-4_21
URL : https://hal.archives-ouvertes.fr/hal-01529780