A flow-based approach to modeling ADSL traffic on an IP backbone link, Annals of Telecommunications, vol.59, pp.11-12, 2004. ,
A signal analysis of network traffic anomalies, Proceedings of the second ACM SIGCOMM Workshop on Internet measurment , IMW '02, 2002. ,
DOI : 10.1145/637201.637210
Space/time trade-offs in hash coding with allowable errors, Communications of the ACM, vol.13, issue.7, pp.422-426, 1970. ,
DOI : 10.1145/362686.362692
Network Applications of Bloom Filters: A Survey, Internet Mathematics, vol.1, issue.4, pp.485-509, 2004. ,
DOI : 10.1080/15427951.2004.10129096
Analysis of an algorithm catching elephants on the Internet, DMTCS Proceedings Series, pp.299-314, 2008. ,
URL : https://hal.archives-ouvertes.fr/hal-01194674
Analysis of a Bloom filter algorithm via the supermarket model, Proceedings of itc21, 2009. ,
Parameter estimation for sums of correlated gamma random variables. Application to anomaly detection in internet traffic, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing, 2008. ,
DOI : 10.1109/ICASSP.2008.4518403
Use of spectral analysis in defense against dos attaks, 2002. ,
New directions in traffic measurement and accounting, Proc. Sigcomm'02, 2002. ,
Hyperloglog: the analysis of a near-optimal cardinality estimation algorithm, Proceedings of the 13th conference on analysis of algorithm, pp.127-146, 2007. ,
URL : https://hal.archives-ouvertes.fr/hal-00406166
Estimating the number of active flows in a data stream over a sliding window, Proceedings of the Fourth Workshop on Analytic Algorithmics and Combinatorics (ANALC0) (New Orleans) SIAM, pp.223-231, 2007. ,
Chaoticity on path space for a queueing network with selection of the shortest queue among several, Journal of Applied Probability, vol.28, issue.01, pp.198-211, 2000. ,
DOI : 10.1007/BF01199263
A framework for classifying denial of service attacks, Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications , SIGCOMM '03, 2003. ,
DOI : 10.1145/863955.863968
Sketch-based change detection, Proceedings of the 2003 ACM SIGCOMM conference on Internet measurement , IMC '03, 2003. ,
DOI : 10.1145/948205.948236
Detecting distributed attacks using network-wide flow data, Proc. FloCon 2005 Analysis Workshop, 2005. ,
The power of two choices in randomized load balancing, IEEE Transactions on Parallel and Distributed Systems, vol.12, issue.10, 1996. ,
DOI : 10.1109/71.963420
Kavé Salamatian , and Christophe Diot, A pragmatic definition of elephants in internet backbone traffic, Internet Measurement Workshop, pp.175-176, 2002. ,
A queueing system with a choice of the shorter of two queues?an asymptotic approach, Problemy Peredachi Informatsii, vol.32, issue.1, pp.20-34, 1996. ,
Detecting syn flooding attacks Azzana) Eurafric Information, E-mail address: Yousra.Chabchoub@inria.fr E-mail address: Christine.Fricker@inria.fr, 2002. ,
Avenue Pierre Marzin, 22300 Lannion, France E-mail address: Fabrice.Guillemin@orange-ft ,