. Bar, . P. Barford, P. D. Kline-j, and R. A. , « A signal analysis of network traffic anomalies, Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, IMW '02, pp.71-82, 2002.

. J. Brutlag, « Aberrant Behavior Detection in Time Series for Network Monitoring, Proceedings of the 14th USENIX conference on System administration, pp.139-146

C. P. , M. J. Owezarski-p, and . Labit-y, « Sub-Space Clustering and Evidence Accumulation for Unsupervised Anomaly Detection in IP Networks, 2010.

. Cho, M. K. Cho-k, and . Kato-a, « Traffic data repository at the WIDE project, Proceedings of the annual conference on USENIX Annual Technical Conference, ATEC '00, pp.51-51

C. G. Muthukrishnan-s, What's new : finding significant differences in network data streams », Networking, IEEE/ACM Transactions on, vol.13, issue.6, pp.1219-1232, 2005.

D. G. Fukuda-k, A. P. Borgnat-p, and . Cho-k, « Extracting hidden anomalies using sketch and non Gaussian multiresolution statistical detection procedures, Proceedings of the 2007 workshop on Large scale attack defense, LSAD '07, pp.145-152, 2007.

E. E. , A. A. Prerau-m, . Portnoy-l, and . Stolfo-s, Geometric Framework for Unsupervised Anomaly Detection : Detecting Intrusions in Unlabeled Data, 2002.

E. M. Peter-kriegel-h and S. J. Xu-x, « A density-based algorithm for discovering clusters in large spatial databases with noise, pp.226-231, 1996.

F. G. Owezarski-p, « Automated Classification of Network Traffic Anomalies, Proceedings SecurComm'09, 2009.

. R. Fon-10-]-fontugne, A. P. Borgnat-p, . Fukuda-k, and . Mawilab, combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking, Proceedings of the 6th International COnference, pp.8-9, 2010.

F. A. Jain-a, « Combining Multiple Clusterings Using Evidence Accumulation, IEEE Trans. Pattern Anal. Mach. Intell, vol.27, pp.835-850, 2005.

H. S. Jaakkola-t, « Exploiting generative models in discriminative classifiers, Proceedings of the 1998 conference on Advances in neural information processing systems II, pp.487-493, 1999.

. K. Jain-a, Data clustering: 50 years beyond K-means, Pattern Recognition Letters, vol.31, issue.8, pp.651-666, 2010.
DOI : 10.1016/j.patrec.2009.09.011

. B. Krishnamurthy, . Sen-s, and C. Y. Zhang-y, Sketch-based change detection, Proceedings of the 2003 ACM SIGCOMM conference on Internet measurement , IMC '03, pp.234-247, 2003.
DOI : 10.1145/948205.948236

L. A. and C. M. Diot-c, « Diagnosing network-wide traffic anomalies, Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, SIGCOMM '04, pp.219-230, 2004.

L. A. and C. M. Diot-c, « Mining anomalies using traffic feature distributions, Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, SIGCOMM '05, pp.217-228, 2005.

L. K. Leckie-c, « Unsupervised anomaly detection in network intrusion detection using clusters, Proceedings of the Twenty-eighth Australasian conference on Computer Science, pp.333-342, 2005.

P. L. Haque-e and . Liu-h, « Subspace clustering for high dimensional data : a review, Explor. Newsl, vol.6, pp.90-105, 2004.

P. L. Eskin-e and . Stolfo-s, « Intrusion detection with unlabeled data using clustering, Proceedings of ACM CSS Workshop on Data Mining Applied to Security, pp.5-8, 2001.

A. Soule, . Salamatian-k, and . Taft-n, Combining filtering and statistical methods for anomaly detection, Proceedings of the 5th ACM SIGCOMM conference on Internet measurement , IMC '05, pp.331-344
DOI : 10.1145/1330107.1330147

URL : https://hal.archives-ouvertes.fr/hal-01489028

G. A. Strehl, « Cluster ensembles ? a knowledge reuse framework for combining multiple partitions, J. Mach. Learn. Res, vol.3, pp.583-617, 2003.