. Ce-chapitre-présente-l-'´-evaluation-d-'unada, Cetté evaluation est réalisée en utilisant les données fournies par le projet MAWILab comme référence. La sensibilité d'UNADA est faible vis-` a-vis des paramètres nbpDBS et tICSim. Cette sensibilité est plus importante vis-` a-vis des paramètres epsDBS et tP ropP tsNormC. L'´ etendue de la plage de réglages donnant de bons résultats est suffisamment grande pour permettre de facilement régler UNADA. Notre algorithme présente un faible taux de faux positifs

M. Roughan, A. Greenberg, C. Kalmanek, M. Rumsewicz, J. Yates et al., Experience in measuring backbone traffic variability, Proceedings of the second ACM SIGCOMM Workshop on Internet measurment , IMW '02, pp.91-92, 2002.
DOI : 10.1145/637201.637213

K. Papagiannaki, N. Taft, Z. Zhang, and C. Diot, Long-term forecasting of Internet backbone traffic: observations and initial models, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), pp.1178-1188, 2003.
DOI : 10.1109/INFCOM.2003.1208954

K. Cho, K. Fukuda, H. Esaki, and A. Kato, The impact and implications of the growth in residential user-to-user traffic, Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications , SIGCOMM '06, pp.207-218, 2006.

K. Cho, K. Mitsuya, and A. Kato, Traffic data repository at the wide project, Proceedings of the annual conference on USENIX Annual Technical Conference, pp.51-51, 2000.

K. Cho, K. Fukuda, H. Esaki, and A. Kato, Observing slow crustal movement in residential user traffic, Proceedings of the 2008 ACM CoNEXT Conference on, CONEXT '08, pp.1-1212, 2008.
DOI : 10.1145/1544012.1544024

. Cisco, Cisco Visual Networking Index: Forecast and Methodology, tech. rep, vol.6, pp.2010-2015

H. Ringberg, A. Soule, J. Rexford, and C. Diot, Sensitivity of pca for traffic anomaly detection, Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, SIGMETRICS '07, pp.109-120, 2007.

. Sandvine, Global internet phenomena report: Fall, 2011.

. Sandvine, Global internet phenomena spotlight: Netflix rising Uw-madison napster traffic measurement, pp.5-17, 2000.

T. Karagiannis, A. Broido, N. Brownlee, K. Claffy, and M. Faloutsos, Is p2p dying or just hiding? [p2p traffic measurement], Global Telecommunications Conference, pp.1532-1538, 2004.
DOI : 10.1109/glocom.2004.1378239

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.6280

P. Borgnat, G. Dewaele, K. Fukuda, P. Abry, and K. Cho, Seven Years and One Day: Sketching the Evolution of Internet Traffic, IEEE INFOCOM 2009, The 28th Conference on Computer Communications, pp.711-719, 2009.
DOI : 10.1109/INFCOM.2009.5061979

URL : https://hal.archives-ouvertes.fr/ensl-00290756

K. Cho, Traffic Shifting away from P2P File Sharing to Web Services, Broadband Traffic Report Internet Initiative, pp.25-30, 2010.

G. Maier, A. Feldmann, V. Paxson, and M. Allman, On dominant characteristics of residential broadband internet traffic, Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference, IMC '09, pp.90-102, 2009.
DOI : 10.1145/1644893.1644904

. Cisco, Cisco Visual Networking Index: Usage, " tech, p.2010

M. Allman, V. Paxson, and J. Terrell, A brief history of scanning, Proceedings of the 7th ACM SIGCOMM conference on Internet measurement , IMC '07, pp.77-82, 2007.
DOI : 10.1145/1298306.1298316

J. D. Brutlag, Aberrant behavior detection in time series for network monitoring, Proceedings of the 14th USENIX conference on System administration, pp.139-146, 2000.

A. Lakhina, M. Crovella, and C. Diot, Mining anomalies using traffic feature distributions, Proceedings of the ACM SIGCOMM 2005 conference, SIGCOMM '05, pp.217-228, 2005.

T. Shon and J. Moon, A hybrid machine learning approach to network anomaly detection, Information Sciences, vol.177, issue.18, pp.3799-3821, 2007.
DOI : 10.1016/j.ins.2007.03.025

N. Duffield, P. Haffner, B. Krishnamurthy, and H. Ringberg, Rule-Based Anomaly Detection on IP Flows, IEEE INFOCOM 2009, The 28th Conference on Computer Communications, pp.424-432, 2009.
DOI : 10.1109/INFCOM.2009.5061947

D. E. Denning, An intrusion-detection model, IEEE Transactions on Software Engineering, vol.13, pp.222-232, 1987.

H. S. Javitz, A. Valdes, A. S. Ooie, and R. D. Patton, The nides statistical component: Description and justification, 1994.

L. Portnoy, E. Eskin, and S. Stolfo, Intrusion detection with unlabeled data using clustering, Proceedings of ACM CSS Workshop on Data Mining Applied to Security, DMSA-2001, pp.5-8, 2001.

I. Jolliffe, Principal component analysis. Springer series in statistics, 2002.

J. Vesanto and E. Alhoniemi, Clustering of the self-organizing map, IEEE Transactions on Neural Networks, vol.11, issue.3, pp.586-600, 2000.
DOI : 10.1109/72.846731

B. Mazzotta, Prominence and polarity in international trade Global Governance: Political Authority in Transition, Proceedings of the annual meeting of the International Studies Association Annual Conference, pp.3-2011

J. B. Macqueen, Some methods for classification and analysis of multivariate observations, Proc. of the fifth Berkeley Symposium on Mathematical Statistics, pp.281-297, 1967.

M. Ester, H. Kriegel, J. Sander, and X. Xu, A density-based algorithm for discovering clusters in large spatial databases with noise, Proc. of 2nd International Conference on Knowledge Discovery and Data Mining, pp.226-231, 1996.

H. Kriegel, P. Kröger, and A. Zimek, Clustering high-dimensional data, ACM Transactions on Knowledge Discovery from Data, vol.3, issue.1, pp.1-158, 2009.
DOI : 10.1145/1497577.1497578

L. Parsons, E. Haque, and H. Liu, Subspace clustering for high dimensional data, ACM SIGKDD Explorations Newsletter, vol.6, issue.1, pp.90-105, 2004.
DOI : 10.1145/1007730.1007731

C. C. Aggarwal, J. L. Wolf, P. S. Yu, C. Procopiuc, and J. S. Park, Fast algorithms for projected clustering, Proceedings of the 1999 ACM SIGMOD international conference on Management of data, SIGMOD '99, pp.61-72, 1999.

K. Woo, J. Lee, M. Kim, and Y. Lee, FINDIT: a fast and intelligent subspace clustering algorithm using dimension voting, Information and Software Technology, vol.46, issue.4, pp.255-271, 2004.
DOI : 10.1016/j.infsof.2003.07.003

K. Y. Yip, D. W. Cheung, and M. K. Ng, On discovery of extremely lowdimensional clusters using semi-supervised projected clustering, Proceedings of the 21st International Conference on Data Engineering, ICDE '05, pp.329-340, 2005.

C. Böhm, K. Kailing, H. Kriegel, and P. Kröger, Density Connected Clustering with Local Subspace Preferences, Fourth IEEE International Conference on Data Mining (ICDM'04), pp.27-34, 2004.
DOI : 10.1109/ICDM.2004.10087

C. Domeniconi, D. Papadopoulos, D. Gunopulos, and S. Ma, Subspace Clustering of High Dimensional Data, Proceedings of the Fourth SIAM International Conference on Data Mining, SIAM, 2004.
DOI : 10.1137/1.9781611972740.58

J. H. Friedman and J. J. Meulman, Clustering objects on subsets of attributes (with discussion), Journal of the Royal Statistical Society: Series B (Statistical Methodology), vol.23, issue.4, pp.815-849, 2004.
DOI : 10.1093/bioinformatics/18.3.413

R. Agrawal, J. Gehrke, D. Gunopulos, and P. Raghavan, Automatic subspace clustering of high dimensional data for data mining applications, SIGMOD '98, pp.94-105

H. Nagesh, S. Goil, and A. Choudhary, Adaptive Grids for Clustering Massive Data Sets, 1st SIAM International Conference Proceedings on Data Mining, 2001.
DOI : 10.1137/1.9781611972719.7

C. Cheng, A. W. Fu, and Y. Zhang, Entropy-based subspace clustering for mining numerical data, Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '99, pp.84-93, 1999.
DOI : 10.1145/312129.312199

K. Kailing, H. Kriegel, and P. Kröger, Density-Connected Subspace Clustering for High-Dimensional Data, Proceedings of the 4th SIAM International Conference on Data Mining (SDM), pp.246-257, 2004.
DOI : 10.1137/1.9781611972740.23

I. Assent, R. Krieger, E. Müller, and T. Seidl, DUSC: Dimensionality Unbiased Subspace Clustering, Seventh IEEE International Conference on Data Mining (ICDM 2007), pp.409-414, 2007.
DOI : 10.1109/ICDM.2007.49

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.559.1652

W. Liao, Y. Liu, and A. Choudhary, A grid-based clustering algorithm using adaptive mesh refinement, 2004.

M. Akodjènou-jeannin, K. Salamatian, and P. Gallinari, Flexible Grid-Based Clustering, Proceedings of the 11th European conference on Principles and Practice of Knowledge Discovery in Databases, pp.350-357, 2007.
DOI : 10.1007/978-3-540-74976-9_33

C. M. Procopiuc, M. Jones, P. K. Agarwal, and T. M. Murali, A Monte Carlo algorithm for fast projective clustering, Proceedings of the 2002 ACM SIGMOD international conference on Management of data , SIGMOD '02, pp.418-427, 2002.
DOI : 10.1145/564691.564739

M. L. Yiu and N. Mamoulis, Frequent-pattern based iterative projected clustering, Proceedings of the Third IEEE International Conference on Data Mining, ICDM '03, p.689, 2003.

M. L. Yiu and N. Mamoulis, Iterative projected clustering by subspace mining Knowledge and Data Engineering, IEEE Transactions on, vol.17, pp.176-189, 2005.

E. Achtert, C. Böhm, H. Kriegel, P. Kröger, I. Müller-gorman et al., Detection and Visualization of Subspace Cluster Hierarchies, Proceedings of the 12th international conference on Database systems for advanced applications, DAS- FAA'07, pp.152-163, 2007.
DOI : 10.1007/978-3-540-71703-4_15

K. Y. Yip, D. Cheung, and M. Ng, HARP: a practical projected clustering algorithm, IEEE Transactions on Knowledge and Data Engineering, vol.16, issue.11, pp.1387-1397, 2004.
DOI : 10.1109/TKDE.2004.74

K. Sequeira and M. Zaki, SCHISM: a new approach to interesting subspace mining, International Journal of Business Intelligence and Data Mining, vol.1, issue.2, pp.137-160, 2005.
DOI : 10.1504/IJBIDM.2005.008360

H. Kriegel, P. Kröger, M. Renz, and S. Wurst, A Generic Framework for Efficient Subspace Clustering of High-Dimensional Data, Fifth IEEE International Conference on Data Mining (ICDM'05), pp.250-257, 2005.
DOI : 10.1109/ICDM.2005.5

G. Moise, J. Sander, and M. Ester, P3C: A Robust Projected Clustering Algorithm, Sixth International Conference on Data Mining (ICDM'06), pp.414-425, 2006.
DOI : 10.1109/ICDM.2006.123

G. Moise, J. Sander, and M. Ester, Robust projected clustering, Knowledge and Information Systems, vol.17, issue.2, pp.273-298, 2008.
DOI : 10.1007/s10115-007-0090-6

C. C. Aggarwal and P. S. Yu, Finding generalized projected clusters in high dimensional spaces, Proceedings of the 2000 ACM SIGMOD international conference on Management of data, pp.70-81, 2000.

C. Böhm, K. Kailing, P. Kröger, and A. Zimek, Computing Clusters of Correlation Connected objects, Proceedings of the 2004 ACM SIGMOD international conference on Management of data , SIGMOD '04, pp.455-466, 2004.
DOI : 10.1145/1007568.1007620

E. Achtert, C. Böhm, P. Kröger, and A. Zimek, Mining Hierarchies of Correlation Clusters, 18th International Conference on Scientific and Statistical Database Management (SSDBM'06), pp.119-128, 2006.
DOI : 10.1109/SSDBM.2006.35

E. Achtert, C. Böhm, J. David, P. Kröger, and A. Zimek, Robust Clustering in Arbitrarily Oriented Subspaces, Proceedings of the 8th SIAM International Conference on Data Mining (SDM), pp.763-774, 2008.
DOI : 10.1137/1.9781611972788.69

D. Barbarà and P. Chen, Using the fractal dimension to cluster datasets, Proceedings of the sixth ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '00, pp.260-264, 2000.
DOI : 10.1145/347090.347145

E. P. Sousa, C. Traina-jr, A. J. Traina, and C. Faloutsos, How to use fractal dimension to find correlations between attributes, First Workshop on Fractals and Self-similarity in Data Mining: Issues and Approaches (in conjunction with 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining), pp.26-30, 2002.

A. Gionis, A. Hinneburg, S. Papadimitriou, and P. Tsaparas, Dimension induced clustering, Proceeding of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining , KDD '05, pp.51-60, 2005.
DOI : 10.1145/1081870.1081880

R. Haralick and R. Harpaz, Linear Manifold Clustering, Proceedings of the 4th International Conference on Machine Learning and Data Mining in Pattern Recognition, pp.641-641, 1007.
DOI : 10.1007/11510888_14

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.76.2408

R. Harpaz and R. Haralick, Mining Subspace Correlations, 2007 IEEE Symposium on Computational Intelligence and Data Mining, pp.335-342, 2007.
DOI : 10.1109/CIDM.2007.368893

J. A. Hartigan, Direct Clustering of a Data Matrix, Journal of the American Statistical Association, vol.27, issue.2, pp.123-129, 1972.
DOI : 10.1080/01621459.1963.10500845

A. Califano, G. Stolovitzky, and Y. Tu, Analysis of gene expression microarrays for phenotype classification, Proceedings of the Eighth International Conference on Intelligent Systems for Molecular Biology, pp.75-85, 2000.

Q. Sheng, Y. Moreau, B. De, and . Moor, Biclustering microarray data by Gibbs sampling, Bioinformatics, vol.19, issue.Suppl 2, pp.196-205, 2003.
DOI : 10.1093/bioinformatics/btg1078

E. Segal, B. Taskar, A. Gasch, N. Friedman, and D. Koller, Rich probabilistic models for gene expression, Bioinformatics, vol.17, issue.Suppl 1, pp.243-252, 2001.
DOI : 10.1093/bioinformatics/17.suppl_1.S243

Y. Cheng and G. M. Church, Biclustering of expression data, Proceedings of the Eighth International Conference on Intelligent Systems for Molecular Biology, pp.93-103, 2000.

J. Yang, W. Wang, H. Wang, and P. Yu, d-clusters: Capturing subspace correlation in a large data set, Proceedings of the 18th International Conference on Data Engineering, ICDE '02, p.517, 2002.

H. Cho, I. S. Dhillon, Y. Guan, and S. Sra, Minimum sum squared residue coclustering of gene expression data, Proceedings of the 4th SIAM International Conference on Data Mining (SDM), pp.114-125, 2004.

A. Ben-dor, B. Chor, R. Karp, and Z. Yakhini, Discovering local structure in gene expression data, Proceedings of the sixth annual international conference on Computational biology , RECOMB '02, pp.49-57, 2002.
DOI : 10.1145/565196.565203

J. Liu and W. Wang, OP-cluster: clustering by tendency in high dimensional space, Third IEEE International Conference on Data Mining, p.187, 2003.
DOI : 10.1109/ICDM.2003.1250919

J. Chang and D. Jin, A new cell-based clustering method for large, highdimensional data in data mining applications, Proceedings of the 2002 ACM symposium on Applied computing, SAC '02, pp.503-507, 2002.

B. Liu, Y. Xia, and P. S. Yu, Clustering through decision tree construction, Proceedings of the ninth international conference on Information and knowledge management , CIKM '00, pp.20-29, 2000.
DOI : 10.1145/354756.354775

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.37.4310

E. Müller, S. Günnemann, I. Assent, and T. Seidl, Evaluating clustering in subspace projections of high dimensional data, Proc. VLDB Endow, pp.1270-1281, 2009.
DOI : 10.14778/1687627.1687770

I. Assent, R. Krieger, E. Müller, and T. Seidl, INSCY: Indexing Subspace Clusters with In-Process-Removal of Redundancy, 2008 Eighth IEEE International Conference on Data Mining, pp.719-724, 2008.
DOI : 10.1109/ICDM.2008.46

G. Moise and J. Sander, Finding non-redundant, statistically significant regions in high dimensional data, Proceeding of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD 08, pp.533-541, 2008.
DOI : 10.1145/1401890.1401956

G. Moise, A. Zimek, P. Kröger, H. Kriegel, and J. Sander, Subspace and projected clustering: experimental evaluation and analysis, Knowledge and Information Systems, vol.17, issue.2, pp.299-326, 2009.
DOI : 10.1007/s10115-009-0226-y

A. P. Dempster, N. M. Laird, and D. B. Rubin, Maximum Likelihood from Incomplete Data via the EM Algorithm, Journal of the Royal Statistical Society. Series B (Methodological), vol.39, issue.1, pp.1-38, 1977.

K. Y. Yip, P. Qi, M. H. Schultz, D. W. Cheung, and K. Cheung, SEMBIOSPHERE: A SEMANTIC WEB APPROACH TO RECOMMENDING MICROARRAY CLUSTERING SERVICES, Biocomputing 2006, pp.188-199, 2006.
DOI : 10.1142/9789812701626_0018

L. Kaufman and P. J. Rousseeuw, Finding Groups in Data An Introduction to Cluster Analysis, 1990.

R. T. Ng and J. Han, Efficient and effective clustering methods for spatial data mining, Proceedings of the 20th International Conference on Very Large Data Bases, VLDB '94, pp.144-155, 1994.

A. B. Ashfaq, M. Javed, S. A. Khayam, and H. Radha, An Information-Theoretic Combining Method for Multi-Classifier Anomaly Detection Systems, 2010 IEEE International Conference on Communications, pp.1-5, 2010.
DOI : 10.1109/ICC.2010.5501984

R. Fontugne, P. Borgnat, P. Abry, and K. Fukuda, MAWILab, Proceedings of the 6th International COnference on, Co-NEXT '10, pp.1-12, 2010.
DOI : 10.1145/1921168.1921179

URL : https://hal.archives-ouvertes.fr/ensl-00552071

S. Shanbhag and T. Wolf, Accurate anomaly detection through parallelism, IEEE Network, vol.23, issue.1, pp.22-28, 2009.
DOI : 10.1109/MNET.2009.4804320

V. Paxson, Bro: a system for detecting network intruders in real-time, Computer Networks, vol.31, issue.23-24, pp.2435-2463, 1999.
DOI : 10.1016/S1389-1286(99)00112-7

F. Silveira and C. Diot, URCA: Pulling out Anomalies by their Root Causes, 2010 Proceedings IEEE INFOCOM, pp.722-730, 2010.
DOI : 10.1109/INFCOM.2010.5462151

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.163.6003

Y. Zhang, Z. Ge, A. Greenberg, and M. Roughan, Network anomography, Proceedings of the 5th ACM SIGCOMM conference on Internet measurement , IMC '05, pp.30-30, 2005.
DOI : 10.1145/1330107.1330146

G. Cormode and S. M. Muthukrishnan, What's new: finding significant differences in network data streams, IEEE/ACM Transactions on Networking, vol.13, issue.6, pp.1219-1232, 2005.
DOI : 10.1109/TNET.2005.860096

B. Krishnamurthy, S. Sen, Y. Zhang, and Y. Chen, Sketch-based change detection, Proceedings of the 2003 ACM SIGCOMM conference on Internet measurement , IMC '03, pp.234-247, 2003.
DOI : 10.1145/948205.948236

M. Roughan, T. Griffin, M. Mao, A. Greenberg, and B. Freeman, Combining routing and traffic data for detection of ip forwarding anomalies, Proceedings of the joint international conference on Measurement and modeling of computer systems, pp.416-417, 2004.

A. Soule, K. Salamatian, and N. Taft, Combining filtering and statistical methods for anomaly detection, Proceedings of the 5th ACM SIGCOMM conference on Internet measurement , IMC '05, pp.331-344, 2005.
DOI : 10.1145/1330107.1330147

URL : https://hal.archives-ouvertes.fr/hal-01489028

G. Dewaele, K. Fukuda, P. Borgnat, P. Abry, and K. Cho, Extracting hidden anomalies using sketch and non Gaussian multiresolution statistical detection procedures, Proceedings of the 2007 workshop on Large scale attack defense , LSAD '07, pp.145-152
DOI : 10.1145/1352664.1352675

URL : https://hal.archives-ouvertes.fr/ensl-00177654

D. Brauckhoff, X. Dimitropoulos, A. Wagner, and K. Salamatian, Anomaly extraction in backbone networks using association rules, Proceedings of the 9th ACM SIGCOMM conference on Internet Measurement Conference, IMC '09, pp.28-34, 2009.
URL : https://hal.archives-ouvertes.fr/hal-00737886

R. Agrawal and R. Srikant, Fast algorithms for mining association rules in large databases, Proceedings of the 20th International Conference on Very Large Data Bases, VLDB '94, pp.487-499, 1994.

P. Barford, J. Kline, D. Plonka, and A. Ron, A signal analysis of network traffic anomalies, Proceedings of the second ACM SIGCOMM Workshop on Internet measurment , IMW '02, pp.71-82, 2002.
DOI : 10.1145/637201.637210

D. Brauckhoff, K. Salamatian, and M. May, Applying PCA for Traffic Anomaly Detection: Problems and Solutions, IEEE INFOCOM 2009, The 28th Conference on Computer Communications, pp.2866-2870, 2009.
DOI : 10.1109/INFCOM.2009.5062248

URL : https://hal.archives-ouvertes.fr/hal-00620090

Y. Kanda, K. Fukuda, and T. Sugawara, Evaluation of Anomaly Detection Based on Sketch and PCA, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, pp.1-5, 2010.
DOI : 10.1109/GLOCOM.2010.5683878

P. Barford and D. Plonka, Characteristics of network traffic flow anomalies, Proceedings of the First ACM SIGCOMM Workshop on Internet Measurement , IMW '01, pp.69-73, 2001.
DOI : 10.1145/505202.505211

F. Silveira, C. Diot, N. Taft, and R. Govindan, Astute: detecting a different class of traffic anomalies, Proceedings of the ACM SIGCOMM 2010 conference, SIG- COMM '10, pp.267-278, 2010.

D. J. Daley, D. Vere, and -. , An Introduction to the Theory of Point Processes: General theory and structure. Probability and its applications, 2007.

C. Barakat, P. Thiran, G. Iannaccone, C. Diot, and P. Owezarski, A flow-based model for internet backbone traffic, Proceedings of the second ACM SIGCOMM Workshop on Internet measurment , IMW '02, pp.35-47, 2002.
DOI : 10.1145/637201.637206

N. H. Darryl, D. Veitch, and P. Abry, Cluster processes, a natural language for network traffic, IEEE Transactions on Networking, pp.2229-2244, 2003.

A. Lakhina, M. Crovella, and C. Diot, Characterization of network-wide anomalies in traffic flows, Proceedings of the 4th ACM SIGCOMM conference on Internet measurement , IMC '04, pp.201-206, 2004.
DOI : 10.1145/1028788.1028813

A. Lakhina, M. Crovella, and C. Diot, Diagnosing network-wide traffic anomalies, Proceedings of the 2004 conference on Applications, technologies, architectures , and protocols for computer communications, SIGCOMM '04, pp.219-230, 2004.

X. Li, F. Bian, M. Crovella, C. Diot, R. Govindan et al., Detection and identification of network anomalies using sketch subspaces, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, pp.147-152, 2006.
DOI : 10.1145/1177080.1177099

P. Chhabra, C. Scott, E. D. Kolaczyk, and M. Crovella, Distributed Spatial Anomaly Detection, IEEE INFOCOM 2008, The 27th Conference on Computer Communications, pp.1705-1713, 2008.
DOI : 10.1109/INFOCOM.2008.232

B. I. Rubinstein, B. Nelson, L. Huang, A. D. Joseph, S. Lau et al., Evading Anomaly Detection through Variance Injection Attacks on PCA, Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection, pp.8-394, 2008.
DOI : 10.1007/978-3-540-87403-4_23

B. I. Rubinstein, B. Nelson, L. Huang, A. D. Joseph, S. Lau et al., Compromising pca-based anomaly detectors for network-wide traffic, 2008.

B. I. Rubinstein, B. Nelson, L. Huang, A. D. Joseph, S. Lau et al., ANTIDOTE, Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference, IMC '09, pp.1-14, 2009.
DOI : 10.1145/1644893.1644895

A. Abdelkefi, Y. Jiang, W. Wang, A. Aslebo, and O. Kvittem, Robust traffic anomaly detection with principal component pursuit, Proceedings of the ACM CoNEXT Student Workshop on, CoNEXT '10 Student Workshop, pp.1-10, 2010.
DOI : 10.1145/1921206.1921217

R. Sadoddin and A. A. Ghorbani, A Comparative Study of Unsupervised Machine Learning and Data Mining Techniques for Intrusion Detection, Proceedings of the 5th international conference on Machine Learning and Data Mining in Pattern Recognition, MLDM '07, pp.404-418, 2007.
DOI : 10.1007/978-3-540-73499-4_31

J. Lei and A. Ghorbani, Network intrusion detection using an improved competitive learning neural network, Proceedings. Second Annual Conference on Communication Networks and Services Research, 2004., pp.190-197, 2004.
DOI : 10.1109/DNSR.2004.1344728

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.178.3537

P. Gogoi, D. Bhattacharyya, B. Borah, and J. K. Kalita, A Survey of Outlier Detection Methods in Network Anomaly Identification, The Computer Journal, vol.54, issue.4, pp.570-588, 2011.
DOI : 10.1093/comjnl/bxr026

J. Zhang and M. Zulkernine, Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection, 2006 IEEE International Conference on Communications, pp.2388-2393, 2006.
DOI : 10.1109/ICC.2006.255127

Y. Yasami and S. P. Mozaffari, A??novel unsupervised classification approach for??network anomaly detection by k-Means clustering and ID3 decision tree learning methods, The Journal of Supercomputing, vol.53, issue.1, pp.231-245, 2010.
DOI : 10.1007/s11227-009-0338-x

L. Zi, J. Yearwood, and X. Wu, Adaptive Clustering with Feature Ranking for DDoS Attacks Detection, 2010 Fourth International Conference on Network and System Security, pp.281-286, 2010.
DOI : 10.1109/NSS.2010.70

L. Kuang and M. Zulkernine, An anomaly intrusion detection method using the csiknn algorithm, Proceedings of the 2008 ACM symposium on Applied computing, SAC '08, pp.921-926, 2008.

X. Li and N. Ye, Grid- and dummy-cluster-based learning of normal and intrusive clusters for computer intrusion detection, Quality and Reliability Engineering International, vol.1, issue.3, pp.231-242, 2002.
DOI : 10.1002/qre.477

N. Ye and X. Li, A scalable clustering technique for intrusion signature recognition, pp.1-4, 2001.

K. Burbeck and S. Nadjm-tehrani, ADWICE ??? Anomaly Detection with Real-Time Incremental Clustering, Proceedings of the 7th International Conference on Information Security and Cryptology, 2004.
DOI : 10.1007/11496618_30

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.62.2165

T. Zhang, R. Ramakrishnan, and M. Livny, Birch: an efficient data clustering method for very large databases, Proceedings of the 1996 ACM SIGMOD international conference on Management of data, SIGMOD '96, pp.103-114, 1996.

D. Barbará, J. Couto, S. Jajodia, L. Popyack, and N. Wu, ADAM, Proceedings of the IEEE Workshop on Information Assurance and Security, pp.11-16, 2001.
DOI : 10.1145/604264.604268

E. Eskin, A. Arnold, M. Prerau, L. Portnoy, and S. Stolfo, A Geometric Framework for Unsupervised Anomaly Detection, Applications of Data Mining in Computer Security, 2002.
DOI : 10.1007/978-1-4615-0953-0_4

K. Leung and C. Leckie, Unsupervised anomaly detection in network intrusion detection using clusters, Proceedings of the Twenty-eighth Australasian conference on Computer Science, pp.333-342, 2005.

J. Oldmeadow, S. Ravinutala, and C. Leckie, Adaptive Clustering for Network Intrusion Detection, Advances in Knowledge Discovery and Data Mining, pp.255-259, 2004.
DOI : 10.1007/978-3-540-24775-3_33

P. Casas, J. Mazel, and P. Owezarski, Steps Towards Autonomous Network Security: Unsupervised Detection of Network Attacks, 2011 4th IFIP International Conference on New Technologies, Mobility and Security, pp.1-5, 2011.
DOI : 10.1109/NTMS.2011.5721067

URL : https://hal.archives-ouvertes.fr/hal-00667917

P. Casas, J. Mazel, and P. Owezarski, UNADA: Unsupervised Network Anomaly Detection Using Sub-space Outliers Ranking, Proceedings of the 10th international IFIP TC 6 conference on Networking -Volume Part I, pp.40-51, 2011.
DOI : 10.1007/978-3-642-20757-0_4

P. Casas, J. Mazel, and P. Owezarski, Knowledge-independent traffic monitoring: Unsupervised detection of network attacks, IEEE Network, vol.26, issue.1, pp.228-242, 2012.
DOI : 10.1109/MNET.2012.6135851

J. Mazel, P. Casas, and P. Owezarski, Sub-Space Clustering and Evidence Accumulation for Unsupervised Network Anomaly Detection, Proceedings of the Traffic Monitoring and Analysis Workshop, 2011.
DOI : 10.1016/j.patrec.2009.09.011

J. Mazel, P. Casas, Y. Labit, and P. Owezarski, Sub-space clustering, interclustering results association & anomaly correlation for unsupervised network anomaly detection, 7th International Conference on Network and Service Management, 2011.

C. Barakat, A. Krifa, Y. Labit, I. Lassoued, J. Mazel et al., Deliverable d3.2 : implementation of adaptive traffic sampling and management , path performance monitoring and management, path performance monitoring and cooperative intrusion and attack/anomaly detection techniques, 2009.

A. Krifa, I. Lassoued, C. Barakat, P. Casas-hernandez, P. Owezarski et al., Deliverable d3.3. experimental evaluation of t01, 2010.

E. Achtert, H. Kriegel, and A. Zimek, ELKI: A Software System for Evaluation of Subspace Clustering Algorithms, Lecture Notes in Computer Science, vol.5069, issue.10, pp.580-585978, 1007.
DOI : 10.1007/978-3-540-69497-7_41

M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann et al., The WEKA data mining software, ACM SIGKDD Explorations Newsletter, vol.11, issue.1, pp.10-18, 2009.
DOI : 10.1145/1656274.1656278

Y. Minsky, Ocaml for the masses, pp.40-4349, 2011.

A. Strehl and J. Ghosh, Cluster ensembles ? a knowledge reuse framework for combining multiple partitions, Journal on Machine Learning Research, vol.3, pp.583-617, 2003.

A. K. Jain, Data clustering: 50 years beyond K-means, Pattern Recognition Letters, vol.31, issue.8, pp.651-666, 2010.
DOI : 10.1016/j.patrec.2009.09.011

A. L. Fred and A. K. Jain, Combining multiple clusterings using evidence accumulation Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol.27, pp.835-850, 2005.

B. Immanuel, M. Budinich, P. M. Pardalos, and M. Pelillo, The maximum clique problem, Handbook of Combinatorial Optimization (supp, pp.1-74

J. Filliâtre and K. Kalyanasundaram, Functory: A Distributed Computing Library for Objective Caml, Trends in Functional Programming, 2011.
DOI : 10.1007/978-3-642-32037-8_5

P. Owezarski and G. Fernandes, Automated classification of network traffic anomalies, Proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks, SecurComm'09, pp.91-100, 2009.

R. Fontugne and K. Fukuda, A hough-transform-based anomaly detector with an adaptive time interval, Proceedings of the 2011 ACM Symposium on Applied Computing, pp.471-477, 2011.

J. R. Quinlan, Induction of decision trees, Machine Learning, pp.81-106, 1986.
DOI : 10.1007/BF00116251

J. R. Quinlan and C. , 5: programs for machine learning, 1993.

P. R. Hunt and S. Hansman, A taxonomy of network and computer attack methodologies, Computers and Security, vol.24, issue.1, pp.31-43, 2003.

T. S. Jaakkola and D. Haussler, Exploiting generative models in discriminative classifiers, Proceedings of the 1998 conference on Advances in neural information processing systems II, pp.487-493, 1999.