G. Munz and G. Carle, Real-time Analysis of Flow Data for Network Attack Detection, 2007 10th IFIP/IEEE International Symposium on Integrated Network Management, pp.100-108, 2007.
DOI : 10.1109/INM.2007.374774

T. Cejka, V. Bartos, M. Svepes, Z. Rosa, and H. Kubatova, NEMEA: A framework for network traffic analysis, 2016 12th International Conference on Network and Service Management (CNSM), pp.195-201, 2016.
DOI : 10.1109/CNSM.2016.7818417

K. Xinidis, I. Charitakis, S. Antonatos, K. G. Anagnostakis, and E. P. Markatos, An Active Splitter Architecture for Intrusion Detection and Prevention, IEEE Transactions on Dependable and Secure Computing, vol.3, issue.1, pp.31-44, 2006.
DOI : 10.1109/TDSC.2006.6

M. Roesch, Snort -lightweight intrusion detection for networks, Proceedings of the 13th USENIX Conference on System Administration. LISA '99, pp.229-238, 1999.

H. Sallay, K. A. Alshalfan, O. B. Fred, and K. Words, A scalable distributed ids architecture for high speed networks, In: IJCSNS International Journal of Computer Science and Network Security, vol.98, p.Citeseer, 2009.

N. Kim, S. Jung, and T. Chung, An Efficient Hash-Based Load Balancing Scheme to Support Parallel NIDS, Computational Science and Its Applications -ICCSA 2011 -International Conference Proceedings, Part I, pp.537-549, 2011.
DOI : 10.1109/TNET.2005.852881

M. Vallentin, R. Sommer, J. Lee, C. Leres, V. Paxson et al., The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware, Recent Advances in Intrusion Detection: 10th International Symposium, pp.107-126, 2007.
DOI : 10.1007/978-3-540-74320-0_6

URL : https://digital.library.unt.edu/ark:/67531/metadc902683/m2/1/high_res_d/935341.pdf

V. Paxson, Bro: a system for detecting network intruders in real-time, Computer Networks, vol.31, issue.23-24, pp.23-24, 1999.
DOI : 10.1016/S1389-1286(99)00112-7

URL : http://www.cs.utexas.edu/~yzhang/teaching/cs386m-s8/Readings/bro99.pdf

R. Fontugne, J. Mazel, and K. Fukuda, Hashdoop: A MapReduce framework for network anomaly detection, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2014.
DOI : 10.1109/INFCOMW.2014.6849281

J. Mai, A. Sridharan, C. N. Chuah, H. Zang, and T. Ye, Impact of packet sampling on portscan detection, IEEE Journal on Selected Areas in Communications, vol.24, issue.12, pp.2285-2298, 2006.

K. Bartos and M. Rehak, Towards Efficient Flow Sampling Technique for Anomaly Detection, Proceedings of the 4th International Conference on Traffic Monitoring and Analysis. TMA'12, pp.93-106, 2012.
DOI : 10.1109/INFCOM.2007.207

T. Cejka and M. Svepes, Analysis of Vertical Scans Discovered by Naive Detection, Management and Security in the Age of Hyperconnectivity: 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, pp.165-169, 2016.
DOI : 10.1109/.2006.1629454

URL : https://hal.archives-ouvertes.fr/hal-01632742

P. Velan and R. Krej?í, Flow Information Storage Assessment Using IPFIXcol, Proceedings of the 6th IFIP WG 6.6 International Autonomous Infrastructure, Management , and Security Conference on Dependable Networks and Services. AIMS'12, pp.155-158, 2012.
DOI : 10.1007/978-3-642-30633-4_21

URL : https://hal.archives-ouvertes.fr/hal-01529780