S. Panjwani, S. Tan, K. M. Jarrin, and M. Cukier, An Experimental Evaluation to Determine if Port Scans are Precursors to an Attack, International Conference on Dependable Systems and Networks, pp.602-611, 2005.
DOI : 10.1109/dsn.2005.18

V. Ghiëtte, N. Blenn, and C. Doerr, Remote Identification of Port Scan Toolchains, 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp.1-5, 2016.

Z. Durumeric, M. Bailey, and J. A. Halderman, An Internet-Wide View of Internet-Wide Scanning, 23rd USENIX Security Symposium, pp.65-78, 2014.

P. Chen, L. Desmet, and C. Huygens, A Study on Advanced Persistent Threats, Communications and Multimedia Security, ser. Lecture Notes in Computer Science, vol.8735, pp.63-72, 2014.
DOI : 10.1007/978-3-662-44885-4_5

URL : https://hal.archives-ouvertes.fr/hal-01404186


G. D. Santis, A. Lahmadi, J. Francois, and O. Festor, Modeling of IP Scanning Activities with Hidden Markov Models: Darknet Case Study, 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp.1-5, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01404127

R. Bodenheim, J. Butts, S. Dunlap, and B. Mullins, Evaluation of the Ability of the Shodan Search Engine to Identify Internet-Facing Industrial Control Devices, International Journal of Critical Infrastructure Protection, vol.7, issue.2, pp.114-123, 2014.

Z. Durumeric, E. Wustrow, and J. A. Halderman, ZMap: Fast InternetWide Scanning and its Security Applications, 2013.

R. D. Graham, MASSCAN: Mass IP Port Scanner, 2014.

M. H. Bhuyan, D. Bhattacharyya, and J. K. Kalita, Surveying Port Scans and their Detection Methodologies, The Computer Journal, vol.54, issue.10, pp.1565-1581, 2011.

C. Gates, Coordinated Scan Detection, NDSS, 2009.

L. Rabiner and B. Juang, An Introduction to Hidden Markov Models, ieee assp magazine, vol.3, issue.1, pp.4-16, 1986.

B. H. Juang and L. R. Rabiner, Hidden Markov Models for Speech Recognition, Technometrics, vol.33, issue.3, pp.251-272, 1991.

D. Ourston, S. Matzner, W. Stump, and B. Hopkins, Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks, Proceedings of the 36th Annual Hawaii International Conference on System Sciences, pp.10-19, 2003.

A. Sperotto, R. Sadre, P. De-boer, and A. Pras, Hidden Markov Model Modeling of SSH Brute-Force Attacks, International Workshop on Distributed Systems: Operations and Management, pp.164-176, 2009.

A. C. Berry, The Accuracy of the Gaussian Approximation to the Sum of Independent Variates, Transactions of the American Mathematical Society, vol.49, issue.1, pp.122-136, 1941.

M. Ester, H. Kriegel, J. Sander, and X. Xu, A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise, Kdd, vol.96, issue.34, pp.226-231, 1996.