Wavelet analysis of long-range-dependent traffic, IEEE Transactions on Information Theory, vol.44, issue.1, pp.2-15, 1998. ,
DOI : 10.1109/18.650984
A new method of inferring flow statistics from sampled data in the Internet ,
Stochastic networks with multiple stable points, Stochastic networks with multiple stable points, pp.255-278, 2008. ,
DOI : 10.1214/009117907000000105
URL : https://hal.archives-ouvertes.fr/hal-00204542
On-line load balancing, Theoret. Comput. Sci, vol.13095, issue.1, pp.73-84, 1994. ,
Mesures de la topologie et du trafic internet, 2006. ,
Etude des méthodes d'´ echantillonnage des flux pour la mesure dans les réseaux large bande, 2004. ,
A flow-based approach to modeling ADSL traffic on an IP backbone link, Annals of Telecommunications, vol.59, pp.11-12, 2004. ,
Inverting sampled ADSL traffic, IEEE International Conference on Communications, 2005. ICC 2005. 2005, 2005. ,
DOI : 10.1109/ICC.2005.1494310
URL : https://hal.archives-ouvertes.fr/inria-00070581
A flow-based model for internet backbone traffic, Proceedings of the second ACM SIGCOMM Workshop on Internet measurment , IMW '02, 2002. ,
DOI : 10.1145/637201.637206
Poisson approximation, 1992. ,
A signal analysis of network traffic anomalies, Proceedings of the second ACM SIGCOMM Workshop on Internet measurment , IMW '02, 2002. ,
DOI : 10.1145/637201.637210
Algorithme de détection des attaques de type syn flooding, 2007. ,
Convergence of probability measures Wiley Series in Probability and Statistics : Probability and Statistics, p.60008, 1999. ,
Space/time trade-offs in hash coding with allowable errors, Communications of the ACM, vol.13, issue.7, pp.422-426, 1970. ,
DOI : 10.1145/362686.362692
Network Applications of Bloom Filters: A Survey, Internet Mathematics, vol.1, issue.4, pp.485-509, 2004. ,
DOI : 10.1080/15427951.2004.10129096
Bounds for packet sampling in the Internet, Preparation ,
Analysis of an algorithm catching elephants on the internet, Fifth Colloquium on Mathematics and Computer Science DMTCS Proceedings Series, pp.299-314, 2008. ,
URL : https://hal.archives-ouvertes.fr/hal-01194674
Analysis of a Bloom filter algorithm via the supermarket model, Proceedings of itc21, 2009. ,
Parameter estimation for sums of correlated gamma random variables. Application to anomaly detection in internet traffic, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing, 2008. ,
DOI : 10.1109/ICASSP.2008.4518403
Adaptative random sampling for load change detection, SIGMETRICS '02 : Proceedings of the 2002 ACM SIGMETRICS international conference on mesurement and modeling of computer systems, pp.272-273, 2002. ,
Self-similarity in World Wide Web traffic: evidence and possible causes, IEEE/ACM Transactions on Networking, vol.5, issue.6, pp.835-846, 1997. ,
DOI : 10.1109/90.650143
Frequency Estimation of Internet Packet Streams with Limited Space, Proceedings of the 10th Annual European Symposium on Algorithms, pp.348-360, 2002. ,
DOI : 10.1007/3-540-45749-6_33
Numerical analysis in modern scientific computing : an introduction, Texts in Applied Mathematics, vol.43, 2003. ,
DOI : 10.1007/978-0-387-21584-6
Estimating flow distributions from sampled flow statistics, SIGCOMM'03, pp.25-29, 2003. ,
Properties and prediction of flow statistics, ACM SIGCOMM Internet Measurement Workshop, pp.6-8, 2002. ,
A Markovian analysis of additive-increase multiplicative-decrease algorithms, Advances in Applied Probability, vol.III, issue.01, pp.85-111, 2002. ,
DOI : 10.1145/122431.122434
Loglog Counting of Large Cardinalities, 2003. ,
DOI : 10.1007/978-3-540-39658-1_55
Detecting syn flooding attacks, IEEE Infocom, p.2, 2002. ,
Building a better NetFlow, Proc. ACM Sigcomm'04, 2004. ,
New directions in traffic measurement and accounting, Proceedings of the ACM SIGCOMM 2002 Conference on Applications, Technologies, Architectures , and Protocols for Computer Communications (SIGCOMM-02), pp.323-338, 2002. ,
DOI : 10.1145/964725.633056
The changing nature of network traffic, ACM SIGCOMM Computer Communication Review, vol.28, issue.2, pp.5-29, 1998. ,
DOI : 10.1145/279345.279346
Efficient policies for carrying Web traffic over flow-switched networks, IEEE/ACM Transactions on Networking, vol.6, issue.6, pp.673-685, 1998. ,
DOI : 10.1109/90.748081
An introduction to probability theory and its applications, 1996. ,
On adaptative sampling, Computing, pp.391-400, 1990. ,
Hyperloglog : the analysis of a nearoptimal cardinality estimation algorithm, Proceedings of the 13th conference on analysis of algorithm (AofA 07) (Juan-les-Pins, France), pp.127-146, 2007. ,
URL : https://hal.archives-ouvertes.fr/hal-00406166
Probabilistic counting algorithms for data base applications, Journal of Computer and System Sciences, vol.31, issue.2, pp.2-182, 1985. ,
DOI : 10.1016/0022-0000(85)90041-8
URL : https://hal.archives-ouvertes.fr/inria-00076244
Loglog counting for the estimation of ip traffic, Proceedings of the 4th Colloquium on Mathematics and Computer Science Algorithms, Trees, Combinatorics and Probabilities, 2006. ,
URL : https://hal.archives-ouvertes.fr/hal-01184707
Order statistics and estimating cardinalities of massive data sets, Discrete Applied Mathematics, vol.157, issue.2 ,
DOI : 10.1016/j.dam.2008.06.020
URL : https://hal.archives-ouvertes.fr/hal-00646123
Estimating the number of active flows in a data stream over a sliding window, Proceedings of the Fourth Workshop on Analytic Algorithmics and Combinatorics (ANALC0) SIAM, pp.223-231, 2007. ,
On the tails of web file size distributions, Proceedings of 39th Allerton Conference on Communication, Control, and Computing, 2001. ,
Chaoticity results for ???join the shortest queue???, Council for African American Researchers in the Mathematical Sciences Contemp. Math, vol.275, pp.53-68, 1997. ,
DOI : 10.1090/conm/275/04490
Inverting sampled traffic, Internet Measurement Conference, pp.27-29, 2003. ,
IP flow information export, For information, see the url http ,
Packet sampling working group, See the url https ,
A framework for classifying denial of service attacks, Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications , SIGCOMM '03, 2003. ,
DOI : 10.1145/863955.863968
Modeling video traffic using M/G/??? input processes: a compromise between Markovian and LRD models, IEEE Journal on Selected Areas in Communications, vol.16, issue.5, pp.733-748, 1998. ,
DOI : 10.1109/49.700909
Detecting distributed attacks using network-wide flow data, Proc. FloCon 2005 Analysis Workshop, 2005. ,
Primet Vicat-Blanc, Maximum likelihood estimation of the flow size distribution tail index from sampled packet data, ACM Sigmetrics Conference, 2009. ,
A comparative study of different heavy tail index estimators of the flow size from sampled data, GridNets '07, Proceedings of the first international conference on Networks for grid applications, pp.1-8, 2007. ,
On the power of two choices: Balls and bins in continuous time, The Annals of Applied Probability, vol.15, issue.3, pp.1733-1764, 2005. ,
DOI : 10.1214/105051605000000205
Charging from sampled network usage, Proceedings of the First ACM SIGCOMM Workshop on Internet Measurement , IMW '01, pp.245-256, 2001. ,
DOI : 10.1145/505202.505232
Approximate frequency counts over data streams, Proceedings of the 28th VLDB Conference, pp.346-357, 2002. ,
Characterization of netwok-wide anomalies in traffic flows, Proceedings of the ACM/SIGCOMM Internet Measurement Conference, pp.201-206, 2004. ,
The power of two choices in randomized load balancing, IEEE Transactions on Parallel and Distributed Systems, vol.12, issue.10, 1996. ,
DOI : 10.1109/71.963420
Identifying elephant flows through periodically sampled packets, Proceedings of the 4th ACM SIGCOMM conference on Internet measurement , IMC '04, 2004. ,
DOI : 10.1145/1028788.1028803
On the feasibility of identifying elephants in internet backbone traffic, 2001. ,
A pragmatic definition of elephants in internet backbone traffic, Proceedings of the second ACM SIGCOMM Workshop on Internet measurment , IMW '02, pp.175-176, 2002. ,
DOI : 10.1145/637201.637227
Wide area traffic : The failure of the Poisson assumption, IEEE/ACM Trans. on Networking, pp.226-244, 1995. ,
Stochastic networks and queues, Stochastic Modelling and Applied Probability. MR, pp.996-883, 2003. ,
Using LiTGen, a realistic IP traffic model, to evaluate the impact of burstiness on performance, Proceedings of the First International ICST Conference on Simulation Tools and Techniques for Communications Networks and Systems, 2008. ,
DOI : 10.4108/ICST.SIMUTOOLS2008.3065
URL : https://hal.archives-ouvertes.fr/hal-01303582
Sketch-based change detection : Methods, evaluation, and applications, 2003. ,
Use of spectral analysis in defense against dos attaks, Proceedings of IEEE Globecom, 2002. ,
A queueing system with a choice of the shorter of two queues?an asymptotic approach, Problemy Peredachi Informatsii, vol.32, issue.1, pp.20-34, 1996. ,
Dobrushin's mean-field approximation for a queue with dynamic routing, 1997. ,
A linear-time probabilistic counting algorithm for database applications, ACM Transactions on Database Systems, vol.15, issue.2, pp.208-229, 1990. ,
DOI : 10.1145/78922.78925
Sampling and filtering techniques for IP packet selection, 2006. ,
DOI : 10.17487/rfc5475