P. Abry and D. Veitch, Wavelet analysis of long-range-dependent traffic, IEEE Transactions on Information Theory, vol.44, issue.1, pp.2-15, 1998.
DOI : 10.1109/18.650984

N. Antunes, Y. Chabchoub, C. Fricker, F. Guillemin, and P. Robert, A new method of inferring flow statistics from sampled data in the Internet

N. Antunes, C. Fricker, P. Robert, and D. Tibi, Stochastic networks with multiple stable points, Stochastic networks with multiple stable points, pp.255-278, 2008.
DOI : 10.1214/009117907000000105

URL : https://hal.archives-ouvertes.fr/hal-00204542

Y. Azar, A. Z. Broder, and .. R. Karlin, On-line load balancing, Theoret. Comput. Sci, vol.13095, issue.1, pp.73-84, 1994.

Y. Azzana, Mesures de la topologie et du trafic internet, 2006.

N. and B. Azzouna, Etude des méthodes d'´ echantillonnage des flux pour la mesure dans les réseaux large bande, 2004.

N. B. Azzouna, F. Clérot, C. Fricker, and F. Guillemin, A flow-based approach to modeling ADSL traffic on an IP backbone link, Annals of Telecommunications, vol.59, pp.11-12, 2004.

N. B. Azzouna, F. Guillemin, S. Poisson, P. Robert, C. Fricker et al., Inverting sampled ADSL traffic, IEEE International Conference on Communications, 2005. ICC 2005. 2005, 2005.
DOI : 10.1109/ICC.2005.1494310

URL : https://hal.archives-ouvertes.fr/inria-00070581

C. Barakat, P. Thiran, G. Iannaccone, C. Diot, and P. Owezarski, A flow-based model for internet backbone traffic, Proceedings of the second ACM SIGCOMM Workshop on Internet measurment , IMW '02, 2002.
DOI : 10.1145/637201.637206

A. D. Barbour, L. Holst, and S. Janson, Poisson approximation, 1992.

P. Barford, J. Kline, D. Plonka, and A. Ron, A signal analysis of network traffic anomalies, Proceedings of the second ACM SIGCOMM Workshop on Internet measurment , IMW '02, 2002.
DOI : 10.1145/637201.637210

B. Benmammar, C. Lévy-leduc, and F. Roueff, Algorithme de détection des attaques de type syn flooding, 2007.

P. Billingsley, Convergence of probability measures Wiley Series in Probability and Statistics : Probability and Statistics, p.60008, 1999.

B. H. Bloom, Space/time trade-offs in hash coding with allowable errors, Communications of the ACM, vol.13, issue.7, pp.422-426, 1970.
DOI : 10.1145/362686.362692

A. Broder and M. Mitzenmacher, Network Applications of Bloom Filters: A Survey, Internet Mathematics, vol.1, issue.4, pp.485-509, 2004.
DOI : 10.1080/15427951.2004.10129096

Y. Chabchoub, C. Fricker, F. Guillemin, and P. Robert, Bounds for packet sampling in the Internet, Preparation

Y. Chabchoub, C. Fricker, F. Meunier, and D. Tibi, Analysis of an algorithm catching elephants on the internet, Fifth Colloquium on Mathematics and Computer Science DMTCS Proceedings Series, pp.299-314, 2008.
URL : https://hal.archives-ouvertes.fr/hal-01194674

Y. Chabchoub, C. Fricker, and H. Mohamed, Analysis of a Bloom filter algorithm via the supermarket model, Proceedings of itc21, 2009.

F. Chatelain, P. Borgnat, J. Y. Tourneret, and P. Abry, Parameter estimation for sums of correlated gamma random variables. Application to anomaly detection in internet traffic, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing, 2008.
DOI : 10.1109/ICASSP.2008.4518403

B. Y. Choi, J. Park, and Z. L. Zhang, Adaptative random sampling for load change detection, SIGMETRICS '02 : Proceedings of the 2002 ACM SIGMETRICS international conference on mesurement and modeling of computer systems, pp.272-273, 2002.

M. Crovella and A. Bestravos, Self-similarity in World Wide Web traffic: evidence and possible causes, IEEE/ACM Transactions on Networking, vol.5, issue.6, pp.835-846, 1997.
DOI : 10.1109/90.650143

E. D. Demaine, A. López-ortiz, and J. I. Munro, Frequency Estimation of Internet Packet Streams with Limited Space, Proceedings of the 10th Annual European Symposium on Algorithms, pp.348-360, 2002.
DOI : 10.1007/3-540-45749-6_33

P. Deuflhard and A. Hohmann, Numerical analysis in modern scientific computing : an introduction, Texts in Applied Mathematics, vol.43, 2003.
DOI : 10.1007/978-0-387-21584-6

N. Duffield, C. L. , and M. Thorup, Estimating flow distributions from sampled flow statistics, SIGCOMM'03, pp.25-29, 2003.

N. Duffield, C. L. , and M. Thorup, Properties and prediction of flow statistics, ACM SIGCOMM Internet Measurement Workshop, pp.6-8, 2002.

V. Dumas, F. Guillemin, and P. Robert, A Markovian analysis of additive-increase multiplicative-decrease algorithms, Advances in Applied Probability, vol.III, issue.01, pp.85-111, 2002.
DOI : 10.1145/122431.122434

M. Durand and P. Flajolet, Loglog Counting of Large Cardinalities, 2003.
DOI : 10.1007/978-3-540-39658-1_55

H. Wang, D. Zhang, and K. Shin, Detecting syn flooding attacks, IEEE Infocom, p.2, 2002.

C. Estan, K. Keys, D. Moore, and G. Varghese, Building a better NetFlow, Proc. ACM Sigcomm'04, 2004.

C. Estan and G. Varghese, New directions in traffic measurement and accounting, Proceedings of the ACM SIGCOMM 2002 Conference on Applications, Technologies, Architectures , and Protocols for Computer Communications (SIGCOMM-02), pp.323-338, 2002.
DOI : 10.1145/964725.633056

A. Feldmann, A. C. Gilbert, W. Willinger, and T. G. Kurtz, The changing nature of network traffic, ACM SIGCOMM Computer Communication Review, vol.28, issue.2, pp.5-29, 1998.
DOI : 10.1145/279345.279346

A. Feldmann, J. Rexford, and R. Cáceres, Efficient policies for carrying Web traffic over flow-switched networks, IEEE/ACM Transactions on Networking, vol.6, issue.6, pp.673-685, 1998.
DOI : 10.1109/90.748081

W. Feller, An introduction to probability theory and its applications, 1996.

P. Flajolet, On adaptative sampling, Computing, pp.391-400, 1990.

P. Flajolet, E. Fusy, O. Gandouet, and F. Meunier, Hyperloglog : the analysis of a nearoptimal cardinality estimation algorithm, Proceedings of the 13th conference on analysis of algorithm (AofA 07) (Juan-les-Pins, France), pp.127-146, 2007.
URL : https://hal.archives-ouvertes.fr/hal-00406166

P. Flajolet and G. N. Martin, Probabilistic counting algorithms for data base applications, Journal of Computer and System Sciences, vol.31, issue.2, pp.2-182, 1985.
DOI : 10.1016/0022-0000(85)90041-8

URL : https://hal.archives-ouvertes.fr/inria-00076244

O. Gandouet and A. Jean-marie, Loglog counting for the estimation of ip traffic, Proceedings of the 4th Colloquium on Mathematics and Computer Science Algorithms, Trees, Combinatorics and Probabilities, 2006.
URL : https://hal.archives-ouvertes.fr/hal-01184707

F. Giroire, Order statistics and estimating cardinalities of massive data sets, Discrete Applied Mathematics, vol.157, issue.2
DOI : 10.1016/j.dam.2008.06.020

URL : https://hal.archives-ouvertes.fr/hal-00646123

F. Giroire and E. Fusy, Estimating the number of active flows in a data stream over a sliding window, Proceedings of the Fourth Workshop on Analytic Algorithmics and Combinatorics (ANALC0) SIAM, pp.223-231, 2007.

W. Gong, Y. Liu, V. Misra, and D. Towsley, On the tails of web file size distributions, Proceedings of 39th Allerton Conference on Communication, Control, and Computing, 2001.

C. Graham, Chaoticity results for ???join the shortest queue???, Council for African American Researchers in the Mathematical Sciences Contemp. Math, vol.275, pp.53-68, 1997.
DOI : 10.1090/conm/275/04490

N. Hohn and D. Veitch, Inverting sampled traffic, Internet Measurement Conference, pp.27-29, 2003.

I. Ipfix-working and . Group, IP flow information export, For information, see the url http

I. Psamp-working and . Group, Packet sampling working group, See the url https

A. Hussain, J. Heidmann, and C. Papadopoulos, A framework for classifying denial of service attacks, Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications , SIGCOMM '03, 2003.
DOI : 10.1145/863955.863968

M. M. Krunz and A. M. Makowski, Modeling video traffic using M/G/??? input processes: a compromise between Markovian and LRD models, IEEE Journal on Selected Areas in Communications, vol.16, issue.5, pp.733-748, 1998.
DOI : 10.1109/49.700909

A. Lakhina, M. Crovella, and C. Diot, Detecting distributed attacks using network-wide flow data, Proc. FloCon 2005 Analysis Workshop, 2005.

P. Loiseau, P. Gonçalves, S. Girard, F. Forbesand, and P. , Primet Vicat-Blanc, Maximum likelihood estimation of the flow size distribution tail index from sampled packet data, ACM Sigmetrics Conference, 2009.

P. Loiseau, P. Gonçalves, and P. P. Vicat-blanc, A comparative study of different heavy tail index estimators of the flow size from sampled data, GridNets '07, Proceedings of the first international conference on Networks for grid applications, pp.1-8, 2007.

M. J. Luczak and C. Mcdiarmid, On the power of two choices: Balls and bins in continuous time, The Annals of Applied Probability, vol.15, issue.3, pp.1733-1764, 2005.
DOI : 10.1214/105051605000000205

N. Duffield, C. Lund, and M. Thorup, Charging from sampled network usage, Proceedings of the First ACM SIGCOMM Workshop on Internet Measurement , IMW '01, pp.245-256, 2001.
DOI : 10.1145/505202.505232

G. S. Manku and R. Motwani, Approximate frequency counts over data streams, Proceedings of the 28th VLDB Conference, pp.346-357, 2002.

A. Lakhina, M. Crovella, and C. Diot, Characterization of netwok-wide anomalies in traffic flows, Proceedings of the ACM/SIGCOMM Internet Measurement Conference, pp.201-206, 2004.

M. Mitzenmacher, The power of two choices in randomized load balancing, IEEE Transactions on Parallel and Distributed Systems, vol.12, issue.10, 1996.
DOI : 10.1109/71.963420

T. Mori, M. Uchida, and R. Kawahara, Identifying elephant flows through periodically sampled packets, Proceedings of the 4th ACM SIGCOMM conference on Internet measurement , IMC '04, 2004.
DOI : 10.1145/1028788.1028803

K. Papagiannaki, N. Taft, S. Bhattacharrya, P. Thiran, K. Salamatian et al., On the feasibility of identifying elephants in internet backbone traffic, 2001.

K. Papagiannaki, N. Taft, S. Bhattacharyya, P. Thiran, K. Salamatian et al., A pragmatic definition of elephants in internet backbone traffic, Proceedings of the second ACM SIGCOMM Workshop on Internet measurment , IMW '02, pp.175-176, 2002.
DOI : 10.1145/637201.637227

V. Paxson and S. Floyd, Wide area traffic : The failure of the Poisson assumption, IEEE/ACM Trans. on Networking, pp.226-244, 1995.

R. Philippe, Stochastic networks and queues, Stochastic Modelling and Applied Probability. MR, pp.996-883, 2003.

C. Rolland, J. Ridoux, and B. Baynat, Using LiTGen, a realistic IP traffic model, to evaluate the impact of burstiness on performance, Proceedings of the First International ICST Conference on Simulation Tools and Techniques for Communications Networks and Systems, 2008.
DOI : 10.4108/ICST.SIMUTOOLS2008.3065

URL : https://hal.archives-ouvertes.fr/hal-01303582

Y. Chen, B. Krishnamurthy, S. Sen, and Y. Zhang, Sketch-based change detection : Methods, evaluation, and applications, 2003.

C. Cheng, T. Kung, and K. Tan, Use of spectral analysis in defense against dos attaks, Proceedings of IEEE Globecom, 2002.

N. D. Vvedenskaya, R. L. Dobrushin, and F. I. Karpelevich, A queueing system with a choice of the shorter of two queues?an asymptotic approach, Problemy Peredachi Informatsii, vol.32, issue.1, pp.20-34, 1996.

N. D. Vvedenskaya and Y. M. Sukhov, Dobrushin's mean-field approximation for a queue with dynamic routing, 1997.

K. Whang, B. T. , and H. M. Taylor, A linear-time probabilistic counting algorithm for database applications, ACM Transactions on Database Systems, vol.15, issue.2, pp.208-229, 1990.
DOI : 10.1145/78922.78925

T. Zseby, M. Molina, N. Duffield, S. Niccolini, and F. , Sampling and filtering techniques for IP packet selection, 2006.
DOI : 10.17487/rfc5475