N. B. Azzouna, F. Clérot, C. Fricker, and F. Guillemin, A flow-based approach to modeling ADSL traffic on an IP backbone link, Annals of Telecommunications, vol.59, pp.11-12, 2004.

P. Barford, J. Kline, D. Plonka, and A. Ron, A signal analysis of network traffic anomalies, Proceedings of the second ACM SIGCOMM Workshop on Internet measurment , IMW '02, 2002.
DOI : 10.1145/637201.637210

B. Bloom, Space/time trade-offs in hash coding with allowable errors, Communications of the ACM, vol.13, issue.7, pp.422-426, 1970.
DOI : 10.1145/362686.362692

A. Broder and M. Mitzenmacher, Network Applications of Bloom Filters: A Survey, Internet Mathematics, vol.1, issue.4, pp.485-509, 2004.
DOI : 10.1080/15427951.2004.10129096

Y. Chabchoub, C. Fricker, F. Meunier, and D. Tibi, Analysis of an algorithm catching elephants on the Internet, DMTCS Proceedings Series, pp.299-314, 2008.
URL : https://hal.archives-ouvertes.fr/hal-01194674

Y. Chabchoub, C. Fricker, and H. Mohamed, Analysis of a Bloom filter algorithm via the supermarket model, Proceedings of itc21, 2009.

F. Chatelain, P. Borgnat, J. Tourneret, and P. Abry, Parameter estimation for sums of correlated gamma random variables. Application to anomaly detection in internet traffic, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing, 2008.
DOI : 10.1109/ICASSP.2008.4518403

C. Cheng, T. Kung, and K. Tan, Use of spectral analysis in defense against dos attaks, 2002.

C. Estan and G. Varghese, New directions in traffic measurement and accounting, Proc. Sigcomm'02, 2002.

P. Flajolet, E. Fusy, O. Gandouet, and F. Meunier, Hyperloglog: the analysis of a near-optimal cardinality estimation algorithm, Proceedings of the 13th conference on analysis of algorithm, pp.127-146, 2007.
URL : https://hal.archives-ouvertes.fr/hal-00406166

F. Giroire and . Fusy, Estimating the number of active flows in a data stream over a sliding window, Proceedings of the Fourth Workshop on Analytic Algorithmics and Combinatorics (ANALC0) (New Orleans) SIAM, pp.223-231, 2007.

C. Graham, Chaoticity on path space for a queueing network with selection of the shortest queue among several, Journal of Applied Probability, vol.28, issue.01, pp.198-211, 2000.
DOI : 10.1007/BF01199263

A. Hussain, J. Heidmann, and C. Papadopoulos, A framework for classifying denial of service attacks, Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications , SIGCOMM '03, 2003.
DOI : 10.1145/863955.863968

B. Krishnamurty, S. Sen, Y. Zhang, and Y. Chen, Sketch-based change detection, Proceedings of the 2003 ACM SIGCOMM conference on Internet measurement , IMC '03, 2003.
DOI : 10.1145/948205.948236

A. Lakhina, M. Crovella, and C. Diot, Detecting distributed attacks using network-wide flow data, Proc. FloCon 2005 Analysis Workshop, 2005.

. Mitzenmacher, The power of two choices in randomized load balancing, IEEE Transactions on Parallel and Distributed Systems, vol.12, issue.10, 1996.
DOI : 10.1109/71.963420

K. Papagiannaki, N. Taft, S. Bhattacharyya, and P. Thiran, Kavé Salamatian , and Christophe Diot, A pragmatic definition of elephants in internet backbone traffic, Internet Measurement Workshop, pp.175-176, 2002.

N. D. Vvedenskaya, R. L. Dobrushin, and F. I. Karpelevich, A queueing system with a choice of the shorter of two queues?an asymptotic approach, Problemy Peredachi Informatsii, vol.32, issue.1, pp.20-34, 1996.

H. Wang, D. Zhang, and K. Shin, Detecting syn flooding attacks Azzana) Eurafric Information, E-mail address: Yousra.Chabchoub@inria.fr E-mail address: Christine.Fricker@inria.fr, 2002.

F. Telecom and R. Division, Avenue Pierre Marzin, 22300 Lannion, France E-mail address: Fabrice.Guillemin@orange-ft