J. D. Case, M. Fedor, M. L. Schoffstall, and J. Davin, RFC: Simple network management protocol (snmp) United States, 1990.

J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson et al., RFC: SIP: Session Initiation Protocol United States, 2002.

H. Abdelnur, T. Avanesov, M. Rusinowitch, and R. State, Abusing SIP Authentication, 2008 The Fourth International Conference on Information Assurance and Security, pp.237-242, 2008.
DOI : 10.1109/IAS.2008.29

URL : https://hal.archives-ouvertes.fr/inria-00405356

L. Wang, Support Vector Machines: Theory and Applications, ser. Studies in Fuzziness and Soft Computing, 2005.

L. Khan, M. Awad, and B. Thuraisingham, A new intrusion detection system using support vector machines and hierarchical clustering, The VLDB Journal, vol.1, issue.2, pp.507-521, 2007.
DOI : 10.1007/s00778-006-0002-5

M. Nassar, R. State, and O. Festor, Monitoring SIP Traffic Using Support Vector Machines, 11th International Symposium on Recent advances in intrusion detection -RAID 2008, pp.311-330, 2008.
DOI : 10.1007/978-3-540-87403-4_17

URL : https://hal.archives-ouvertes.fr/inria-00325290

R. Debnath, N. Takahide, and H. Takahashi, A decision based oneagainst-one method for multi-class support vector machine, Pattern Anal. Appl, vol.7, issue.2, pp.164-175, 2004.

C. Hsu and C. Lin, A comparison of methods for multiclass support vector machines, Neural Networks IEEE Transactions on, vol.13, issue.2, pp.415-425, 2002.

N. Cristianini and J. Shawe-taylor, An introduction to support Vector Machines: and other kernel-based learning methods, 2000.
DOI : 10.1017/CBO9780511801389

P. Berkhin, A Survey of Clustering Data Mining Techniques, Grouping Multidimensional Data, pp.25-71, 2006.
DOI : 10.1007/3-540-28349-8_2

M. Dutta, A. K. Mahanta, and A. K. Pujari, QROCK: A quick version of the ROCK algorithm for clustering of categorical data, Pattern Recognition Letters, vol.26, issue.15, pp.2364-2373, 2005.
DOI : 10.1016/j.patrec.2005.04.008

A. Torsello, D. Hidovic-rowe, and M. Pelillo, Polynomial-time metrics for attributed trees, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.27, issue.7, pp.1087-1099, 2005.
DOI : 10.1109/TPAMI.2005.146

D. H. Crocker and P. Overell, Augmented BNF for Syntax Specifications: ABNF, " United States, 1997.

H. Scholz, SIP Stack Fingerprinting and Stack Difference Attacks, Black Hat Briefings, 2006.

P. Baldi, S. Brunak, Y. Chauvin, C. A. Andersen, and H. Nielsen, Assessing the accuracy of prediction algorithms for classification: an overview, Bioinformatics, vol.16, issue.5, pp.412-436, 2000.
DOI : 10.1093/bioinformatics/16.5.412

V. Levenshtein, Binary codes capable of correcting deletions, insertions and reversals, Soviet Physics Doklady, vol.10, 1966.

D. Comer and J. C. Lin, Probing TCP Implementations, USENIX Summer, pp.245-255, 1994.

G. F. Lyon, Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning. USA: Insecure, 2009.

J. Caballero, S. Venkataraman, P. Poosankam, M. G. Kang, D. Song et al., FiG: Automatic Fingerprint Generation, The 14th Annual Network & Distributed System Security Conference, 2007.

H. Kim, K. Claffy, M. Fomenkov, D. Barman, M. Faloutsos et al., Internet traffic classification demystified, Proceedings of the 2008 ACM CoNEXT Conference on, CONEXT '08
DOI : 10.1145/1544012.1544023

J. Ma, K. Levchenko, C. Kreibich, S. Savage, and G. M. Voelker, Unexpected means of protocol inference, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, pp.313-326, 2006.
DOI : 10.1145/1177080.1177123

P. Haffner, S. Sen, O. Spatscheck, and D. Wang, ACAS, Proceeding of the 2005 ACM SIGCOMM workshop on Mining network data , MineNet '05, pp.197-202, 2005.
DOI : 10.1145/1080173.1080183

H. Yan, K. Sripanidkulchai, H. Zhang, Z. Shae, and D. Saha, Incorporating Active Fingerprinting into SPIT Prevention Systems, Third Annual VoIP Security Workshop, 2006.

J. François, H. Abdelnur, R. State, and O. Festor, Automated Behavioral Fingerprinting, 12th International Symposium on Recent advances in intrusion detection -RAID 2009, 2009.
DOI : 10.1007/978-3-642-04342-0_10

H. Abdelnur, R. State, and O. Festor, Advanced Network Fingerprinting , " in Recent Advances in Intrusion Detection Lecture Notes in Computer Science Computer Science, ser, Computer Science, vol.5230, pp.372-389, 2008.

]. P. Düssel, C. Gehl, P. Laskov, and K. Rieck, Incorporation of Application Layer Protocol Syntax into Anomaly Detection, ICISS '08: Proceedings of the 4th International Conference on Information Systems Security, pp.188-202, 2008.
DOI : 10.1007/978-3-540-30143-1_11

K. Rieck, Machine learning for application-layer intrusion detection, 2009.

M. Collins and N. Duffy, Convolution kernels for natural language, Advances in Neural Information Processing Systems, 2001.