P. Garcia-teodoro, J. Diaz-verdejo, G. Maciá-fernández, and E. Vázquez, Anomaly-based network intrusion detection: Techniques, systems and challenges, computers & security, vol.28, issue.1-2, pp.18-28, 2009.

M. Ahmed, A. N. Mahmood, and J. Hu, A survey of network anomaly detection techniques, Journal of Network and Computer Applications, vol.60, pp.19-31, 2016.

T. Benson, A. Akella, and D. A. Maltz, Network traffic characteristics of data centers in the wild, Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, pp.267-280, 2010.

M. Zhu, K. Ye, and C. Xu, Network anomaly detection and identification based on deep learning methods, International Conference on Cloud Computing, pp.219-234, 2018.

C. Yin, Y. Zhu, J. Fei, and X. He, A deep learning approach for intrusion detection using recurrent neural networks, IEEE Access, vol.5, pp.21-954, 2017.

J. K. Chorowski, D. Bahdanau, D. Serdyuk, K. Cho, and Y. Bengio, Attentionbased models for speech recognition, Advances in neural information processing systems, pp.577-585, 2015.

S. Hochreiter and J. Schmidhuber, Long short-term memory, Neural computation, vol.9, issue.8, pp.1735-1780, 1997.

, Intrusion detection evaluation dataset (cicids2017), Mcafee labs threats report, 2018.

. Available,

B. Sun, L. Osborne, Y. Xiao, and S. Guizani, Intrusion detection techniques in mobile ad hoc and wireless sensor networks, IEEE Wireless Communications, vol.14, issue.5, 2007.

A. Sperotto, G. Schaffrath, R. Sadre, C. Morariu, A. Pras et al., An overview of ip flow-based intrusion detection, IEEE Communications Surveys and Tutorials, vol.12, issue.3, pp.343-356, 2010.

T. Abbes, A. Bouhoula, and M. Rusinowitch, Efficient decision tree for protocol analysis in intrusion detection, International Journal of Security and Networks, vol.5, issue.4, pp.220-235, 2010.
URL : https://hal.archives-ouvertes.fr/inria-00528201

M. S. Khan, Rule based network intrusion detection using genetic algorithm, International Journal of Computer Applications, vol.18, issue.8, pp.26-29, 2011.

M. Amini, R. Jalili, and H. R. Shahriari, Rt-unnid: A practical solution to realtime network-based intrusion detection using unsupervised neural networks," computers & security, vol.25, pp.459-468, 2006.

A. Thilina, S. Attanayake, S. Samarakoon, D. Nawodya, L. Rupasinghe et al., Intruder detection using deep learning and association rule mining, Computer and Information Technology (CIT), pp.615-620, 2016.

F. Yuan, Y. Cao, Y. Shang, Y. Liu, J. Tan et al., Insider threat detection with deep neural network, International Conference on Computational Science, pp.43-54, 2018.

J. Kim, J. Kim, H. L. Thu, and H. Kim, Long short term memory recurrent neural network classifier for intrusion detection, 2016 International Conference on, pp.1-5, 2016.