E. Cooke, F. Jahanian, and D. Mcpherson, The zombie roundup: Understanding, detecting, and disrupting botnets, Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI), pp.39-44, 2005.

H. Hamed and E. , Dynamic rule-ordering optimization for high-speed firewall filtering, Proceedings of the 2006 ACM Symposium on Information, computer and communications security , ASIACCS '06, pp.332-342, 2006.
DOI : 10.1145/1128817.1128867

A. Jsang, S. Pope, J. Diaz, and B. Bouchon-meunier, Dempster's rule as seen by little coloured balls, Information Fusion Journal, 2005.

N. Brownlee and K. Claffy, Understanding Internet traffic streams: dragonflies and tortoises, IEEE Communications Magazine, vol.40, issue.10, pp.110-117, 2002.
DOI : 10.1109/MCOM.2002.1039865

M. Faloutsos, P. Faloutsos, and C. Faloutsos, On power-law relationships of the internet topology, SIGCOMM, pp.251-262, 1999.

S. M. Bellovin, Distributed firewalls, 1999.

S. Ioannidis, A. D. Keromytis, S. M. Bellovin, and J. M. Smith, Implementing a distributed firewall, Proceedings of the 7th ACM conference on Computer and communications security , CCS '00, pp.190-199, 2000.
DOI : 10.1145/352600.353052

R. Janakiraman, M. Waldvogel, and Q. Zhang, Indra: a peer-to-peer approach to network intrusion detection and prevention, WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003., pp.226-231
DOI : 10.1109/ENABL.2003.1231412

K. Deeter, K. Singh, S. Wilson, L. Filipozzi, and S. T. Vuong, APHIDS: A Mobile Agent-Based Programmable Hybrid Intrusion Detection System, pp.244-253, 2004.
DOI : 10.1007/978-3-540-30178-3_23

U. Ultes-nitsche and I. Yoo, Steps toward and intelligent firewall a basic model, Proc. Conference on Information Security for South Africa (ISSA2003), pp.9-11, 2003.

Y. Kim, W. C. Lau, M. C. Chuah, and H. J. Chao, Packetscore: A statistics-based packet filtering scheme against distributed denial-ofservice attacks, IEEE Transactions on Dependable and Secure Computing, vol.3, issue.2, pp.141-155, 2006.

R. Mahajan, S. M. Bellovin, S. Floyd, J. Ioannidis, V. Paxson et al., Controlling high bandwidth aggregates in the network, ACM SIGCOMM Computer Communication Review, vol.32, issue.3, pp.62-73, 2002.
DOI : 10.1145/571697.571724

T. Peng, C. Leckie, and K. Ramamohanarao, Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs, Proceedings of 8th Australasian Conference on Information Security and Privacy, pp.214-225, 2003.
DOI : 10.1007/3-540-45067-X_19