. Dans-le-même-contexte, nous pouvons citer également les arbres d'attaque [SCHNEIER 99], [MAUW ET OOSTDIJK 05

A. Notre-connaissance, attaque n'ont pas été utilisés à ce stade Plateforme d'évaluation éléments qui la composent : ? Machine Cible avec IDS ou IPS ? Machine d'Attaque ? Machine de Trafic Normal ? Machine d'Analyse Les différentes machines composant la plateforme finale ne sont pas, en réalité des machines physiques diff´rentesdiff´rentes. Nous utilisons un système de machines virtuelles. Ceci a été décidé pour des raisons de coût, mais également pour la portabilité de la plateforme. Il existe différents systèmes de gestion de machines virtuelles, Nous avons décidé d'utiliser le format " VDI " qui est utilisé par VirtualBox 9 . D'autres systèmes tels que Qemu 10 peuvent également exécuter des machines au format VDI

R. Akrout, E. Alata, A. Dessiatnikoff, Y. Deswarte, S. Gombault et al., GHz avec 6 Go de RAM. Le système d'exploitation est Gnu/Linux (version 2.6.32 du noyau Linux) Le serveur exécute Ruby (version 1.8) Rails (version 2.3.2) et utilise la bibliothèque bmsql-ruby 1.8. 9. http://www.virtualbox.org/ 10, Les expériences ont été réalisées sur une machine équippée d'un processeur Pentium 4, 2010.

. R. Akrout, A. Akrout, and . Dessiatnikoff, An attack-goal driven approach for web applications security assessment, European Dependable Computing Conference, pp.47-48, 2010.

E. A. Akrout, M. Akrout, V. Kaâniche, and . Nicomette, Identification de vulnérabilités et évaluation de systèmes de détection d'intrusion pour les applications web, Congrès des Doctorants EDSYS 2011, pp.6-10, 2011.

E. A. Akrout, . 12a-]-r, E. Akrout, A. Alata, M. Dessiatnikoff et al., Evaluation d'IDS : Méthodologie, Projet DALI. D2.ANR. Projet DALI, vol.3, p.9, 2012.

E. A. Alata, M. Alata, V. Kaâniche, R. Nicomette, and . Akrout, A Vulnerability-Based Approach to Build Attack Scenarios for Web Applications, 14 pages The 6th International Conference on Network and Systems Security (NSS)

. M. Almgren, U. Almgren, and . Lindqvist, Application-Integrated Data Collection for Security Monitoring, Proceedings of the fourth International Symposium on Recent Advances in Intrusion Detection, pp.22-36, 2001.
DOI : 10.1007/3-540-45474-8_2

]. J. Anderson-80 and . Anderson, Computer Security threat Monitoring and surveillance

E. A. Arlat, A. Arlat, Y. Costes, J. Crouzet, D. Laprie et al., Fault injection and dependability evaluation of fault-tolerant systems, IEEE Transactions on Computers, vol.42, issue.8, pp.913-923, 1993.
DOI : 10.1109/12.238482

A. Athanasiades-et-alathanasiades, J. Abler, H. Levine, G. Owen, and . Riley, Intrusion detection testing and benchmarking methodologies, First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003. Proceedings., pp.63-72, 2003.
DOI : 10.1109/IWIAS.2003.1192459

S. Axelsson, Intrusion Detection Systems : A Survey and Taxonomy, 2000.

E. B. Barnett, B. Barnett, and . Rectanus, WAF Virtual Patching Workshop : Securing WebGoat with ModSecurity, 2009.

E. A. Bau, E. Bau, D. Bursztein, J. Gupta, and . Mitchell, State of the Art: Automated Black-Box Web Application Vulnerability Testing, 2010 IEEE Symposium on Security and Privacy, 2010.
DOI : 10.1109/SP.2010.27

E. A. Beugnard, J. Beugnard, N. Jézéquel, D. Plouzeau, and . Watkins, Making components contrat aware, IEEE Computer, vol.23, issue.7, 1999.
DOI : 10.1109/2.774917

]. A. Bradley-97 and . Bradley, The use of the area under the ROC curve in the evaluation of machine learning algorithms, Pattern Recognition, vol.30, issue.7, pp.1145-1159, 1997.
DOI : 10.1016/S0031-3203(96)00142-2

E. A. Caswell, J. Caswell, J. Beale, J. Foster, and . Faircloth, Snort 2.0 Intrusion Detection

E. A. Chen, J. Chen, E. Xu, P. Sezer, R. Gauriar et al., Non control data attacks are realistic threats, Usenix Security Symposium, pp.177-192, 2005.

E. Cheswik, . R. Bellovin-94-]-w, S. M. Cheswik, and . Bellovin, Firewalls and Internet Security, 1994.

. M. Cova, D. Cova, V. Balzarotti, G. Felmetsger, and . Vigna, Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications, Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID), pp.63-86, 2007.
DOI : 10.1007/978-3-540-74320-0_4

. J. Christmansson, R. Christmansson, and . Chillarege, Generation of an Error Set that Emulates Software Faults, IEEE Fault Tolerant Computing Symp, p.26, 1996.

E. A. Crouzet, P. Crouzet, H. Thevenod-fosse, and . Waeselynck, Validation du test du logiciel par injection de fautes : l'outil SESAME, 11ème Colloque National de Fiabilité et Maintenabilité, pp.551-559, 1998.

A. M. Debar-et, A. Dacier, and . Wespi, A revised taxonomy for intrusion detection systems, Annales des Télecommunications, vol.55, pp.361-378, 2000.

E. Debar, ]. H. Morin-02, B. Debar, and . Morin, Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems, Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection, 2002.
DOI : 10.1007/3-540-36084-0_10

. H. Debar, E. Debar, and . Tombini, Webanalyzer : D??tection Pr??cise D???attaques HTTP dans les Journaux de Serveurs Web, Proceedings of EICAR 2005, 2005.
DOI : 10.1007/BF03219929

E. A. Desasilva, A. C. Desasilva, T. D. Dossantos, J. D. Mancilha, and A. Montes, Detecting attack signatures in the real network withannida, ElsevierLtd, 2007.

E. A. Dessiatnikoff, R. Dessiatnikoff, E. Akrout, V. Alata, M. Nicomette et al., Amélioration de la détection de vulnérabilités Web par classification automatique des réponses, Computer and Electronics Security Applications Rendez-vous, pp.116-130, 2010.

E. A. Dessiatnikoff, . 11a-]-a, R. Dessiatnikoff, E. Akrout, M. Alata et al., HTML pages clustering algorithm for web security scanners, p.12, 2011.

E. A. Dessiatnikoff, . 11b-]-a, R. Dessiatnikoff, E. Akrout, M. Alata et al., A Clustering Approach for Web Vulnerabilities Detection, 2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing, pp.12-14, 2011.
DOI : 10.1109/PRDC.2011.31

URL : https://hal.archives-ouvertes.fr/hal-00755212

E. A. Deswarte, L. Deswarte, J. C. Blain, and . Fabre, Intrusion tolerance in distributed computing systems, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy, pp.110-121, 1991.
DOI : 10.1109/RISP.1991.130780

. Deswarte-03a-]-y and . Deswarte, Chapitre 1 : La sécurité des systèmes d'information et de communication, Sécurité des réseaux et des systèmes répartis, pp.15-65, 2003.

. Deswarte-03b-]-y and . Deswarte, Comment peut-on tolérer les intrusions sur internet ? : Les systèmes critiques face aux malveillances. La Revue de l'Electricité et de l'Electronique, pp.83-90, 2003.

E. Deswarte, . Powell-06-]-y, D. Deswarte, and . Powell, Internet Security: An Intrusion-Tolerance Approach, Proceedings of the IEEE, pp.432-441, 2006.
DOI : 10.1109/JPROC.2005.862320

E. A. Doupe, M. Doupé, G. Cova, and . Vigna, Why Johnny Can???t Pentest: An Analysis of Black-Box Web Vulnerability Scanners, Proc. DIMVA, 2010.
DOI : 10.1007/978-3-642-14215-4_7

]. P. Dupont-96 and . Dupont, Incremental regular inference, pp.222-237, 1996.
DOI : 10.1007/BFb0033357

E. Duraes, ]. J. Madeira-06, H. Duraes, and . Madeira, Emulation of Software Faults: A Field Data Study and a Practical Approach, IEEE Transactions on Software Engineering, vol.32, issue.11, 2006.
DOI : 10.1109/TSE.2006.113

E. A. Esposito, C. Esposito, F. Mazzariello, S. Oliviero, E. C. Romano et al., Evaluating pattern recognition techniques in intrusion detection systems, Proceedings of the 5th International Workshop on Pattern Recognition in Information Systems (PRIS), pp.144-153, 2005.

]. T. Fawcett-06 and . Fawcett, An introduction to roc analysis. Pattern recognition Letters, pp.861-874, 2006.

E. Fogla, . P. Lee, W. Fogla, and . Lee, Evading network anomaly detection systems, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.59-68, 2006.
DOI : 10.1145/1180405.1180414

E. Fonseca, M. Fonseca, H. Vieira, and . Madeira, Detecting Malicious SQL, Proceedings of TrustBus, pp.259-268, 2007.
DOI : 10.1007/978-3-540-74409-2_28

E. Fonseca, M. Fonseca, H. Vieira, and . Madeira, Testing and Comparing Web Vulnerability Scanning Tools for SQL Injection and XSS Attacks, 13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007), pp.330-337, 2007.
DOI : 10.1109/PRDC.2007.55

E. Fonseca, . J. Vieira-08a-], M. Fonseca, and . Vieira, Mapping software faults with web security vulnerabilities, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN), 2008.
DOI : 10.1109/DSN.2008.4630094

E. Fonseca, M. Fonseca, H. Vieira, and . Madeira, Training Security Assurance Teams Using Vulnerability Injection, 2008 14th IEEE Pacific Rim International Symposium on Dependable Computing, 2008.
DOI : 10.1109/PRDC.2008.43

E. A. Fonseca, M. Fonseca, H. Vieira, and . Madeira, Vulnerability & attack injection for web applications, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks, pp.93-102, 2009.
DOI : 10.1109/DSN.2009.5270349

]. J. Fonseca-10 and . Fonseca, Evaluating the [In]security of Web applications, 2010.

M. S. Gadelrab, Évaluation des Systèmes de Détection d'Intrusion, Thèse de l'Université Toulouse III-Paul Sabatier, 2008.

. Gao, D. Reiter, and . Song, Gray-box extraction of execution graphs for anomaly detection, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.318-329, 2004.
DOI : 10.1145/1030083.1030126

. Ghosh, . Al-ghosh, . Ch, M. Michael, and . Schatz, A realtime intrusion detection system based on learning program behavior, Proceedings of the Third International Workshop on the Recent Advances in Intrusion Detection (RAID'2000), pp.93-109, 2000.

A. G. Giacinto-et, R. Giacinto, M. D. Perdisci, F. Ri, and . Roli, Intrusion detection in computer networks by a modular ensemble of one-class classifiers, Information Fusion, vol.9, issue.1, 2006.
DOI : 10.1016/j.inffus.2006.10.002

E. A. Gilham, F. Gilham, R. Jagannathan, P. G. Neumann, H. S. Javitz et al., A real-time intrusion detection expert system (ides, 1992.

. Graham-72-]-r.-l and . Graham, An efficient algorith for determining the convex hull of a finite planar set, Information Processing Letters, vol.1, issue.4, pp.132-133, 1972.
DOI : 10.1016/0020-0190(72)90045-2

E. A. Gupta, C. Gupta, G. Raissi, P. Dray, J. Poncelet et al., Détection d'intrusions : de l'utilisation de signatures statistiques, Actes du 5ieme Atelier Fouille de Données Complexes (FDC 08), pp.105-116, 2008.

. Gutesman-09-]-e and . Gutesman, gFuzz : An Instrumented Web Application Fuzzing Environment, Hack.Lu '08, 2008.

E. A. Haines, J. H. Lee, L. M. Rossey, and R. K. Cunningham, Extending the DARPA off-line intrusion detection evaluations, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01, 2001.
DOI : 10.1109/DISCEX.2001.932190

W. G. Halfond, J. Viegas, and A. Orso, A Classification of SQL Injection Attacks and Countermeasures, Proc. of the International Symposium on Secure Software Engineering, 2006.

E. A. Heberlein, G. Todd-heberlein, K. N. Dias, B. Levitt, J. Mukherjee et al., A network security monitor, Proceedings ot the 1990 IEEE Computer Society Symposiumon Research in Security and Privacy, pp.296-304, 1990.

. Hofmeyr-98-]-s.-a, S. Hofmeyr, A. Forrest, and . Somayaji, Intrusion Detection Using Sequences of System Calls, Journal of Computer Security, 1998.

. Huang, . Huang, L. Shih-kun, . Tsung-po, and C. Tsai, Web application security assessment by fault injection and behavior monitoring, Proceedings of the twelfth international conference on World Wide Web , WWW '03, pp.148-159, 2003.
DOI : 10.1145/775152.775174

. Huang, F. Huang, C. Yu, C. Huang, D. Tsai et al., Securing web application code by static analysis and runtime protection, Proceedings of the 13th conference on World Wide Web , WWW '04, pp.40-52
DOI : 10.1145/988672.988679

E. Hunt, ]. J. Mcilroy-76, M. D. Hunt, and . Mcilroy, An Algorithm for Differential File Comparison, 1976.

K. Ilgun, R. A. Kemmerer, and P. A. Porras, State transition analysis: a rule-based intrusion detection approach, IEEE Transactions on Software Engineering, vol.21, issue.3, pp.181-199, 1995.
DOI : 10.1109/32.372146

E. Ingham and . Al, Ingham and Hajime Inoue Comparing anomaly detection techniques for http, Proceeding of the 10th International Symposium on Recent Advances in Intrusion Detection, pp.42-62, 2007.

E. A. Ingols, R. Ingols, K. Lippmann, and . Piwowarski, Practical Attack Graph Generation for Network Defense, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 2006.
DOI : 10.1109/ACSAC.2006.39

]. R. Iyer, Experimental Evaluation " , Special Issue FTCS-25 Silver Jubilee, IEEE Symp. on Fault Tolerant Computing, pp.115-132, 1995.

. C. Johnson-67-]-s and . Johnson, Hierarchical clustering schemes, Psychometrika Journal, pp.241-254, 1967.
DOI : 10.1007/BF02289588

E. A. Jovanovic, C. Jovanovic, E. Kruegel, and . Kirda, Pixy : A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper), IEEE Symposium on, 2006.

E. A. Jovanovic, C. Jovanovic, E. Kruegel, and . Kirda, Static analysis for detecting taint-style vulnerabilities in web applications, Journal of Computer Security, vol.18, issue.5, pp.861-907, 2010.
DOI : 10.3233/JCS-2009-0385

S. T. Kamada and . Kawai, An algorithm for drawing general undirected graphs, Information Processing Letters, vol.31, issue.1, pp.7-15, 1989.
DOI : 10.1016/0020-0190(89)90102-6

E. A. Kiezun, P. J. Kiezun, K. Guo, M. D. Jayaraman, and . Ernst, Automatic creation of SQL Injection and cross-site scripting attacks, 2009 IEEE 31st International Conference on Software Engineering, 2009.
DOI : 10.1109/ICSE.2009.5070521

E. A. Kirda, C. Kirda, G. Kruegel, N. Vigna, and . Jovanovic, Noxes, Proceedings of the 2006 ACM symposium on Applied computing , SAC '06, pp.330-337, 2006.
DOI : 10.1145/1141277.1141357

. C. Ko, G. Ko, K. Fink, and . Levitt, Automated detection of vulnerabilities in privileged programs by execution monitoring, Tenth Annual Computer Security Applications Conference, pp.134-144, 1994.
DOI : 10.1109/CSAC.1994.367313

. C. Ko, M. Ko, K. Ruschitzka, and . Levitt, Execution monitoring of security-critical programs in distributed systems: a specification-based approach, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), pp.175-187, 1997.
DOI : 10.1109/SECPRI.1997.601332

E. A. Kordy, S. Kordy, S. Mauw, P. Radomorovic, and . Schweitzer, Foundations of Attack???Defense Trees, Proc. of Formal Aspects of Security and Trust (FAST 2010), pp.80-95
DOI : 10.1007/978-3-540-88873-4_8

K. Kosuga-et-alkosuga, M. Kono, and . Hanaoka, Sania : Syntactic and Semantic Analysis for Automated Testing against SQL Injection, 23rd Annual Computer Security Applications Conference (ACSAC2007), pp.10-14, 2007.

E. A. Kruegel, D. Kruegel, F. Mutz, G. Valeur, and . Vigna, On the Detection of Anomalous System Call Arguments, 8th European Symposium on Research in Computer Security (ESORICS 2003), pp.326-343, 2003.
DOI : 10.1007/978-3-540-39650-5_19

E. A. Lam, M. S. Lam, M. Martin, B. Livshits, and J. Whaley, Securing web applications with static and dynamic information flow tracking, Proceedings of the 2008 ACM SIGPLAN symposium on Partial evaluation and semantics-based program manipulation , PEPM '08, pp.3-12, 2008.
DOI : 10.1145/1328408.1328410

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.130.6756

E. A. Leitner, I. Leitner, M. Ciupa, B. Oriol, A. Meyer et al., Contract driven development = test driven development - writing test cases, Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering , ESEC-FSE '07, 2007.
DOI : 10.1145/1287624.1287685

E. A. Le-traon, Y. Le-traon, B. Baudry, and J. Jézéquel, Design by Contract to Improve Software Vigilance, IEEE Transactions on Software Engineering, vol.32, issue.8, p.32, 2006.
DOI : 10.1109/TSE.2006.79

URL : https://hal.archives-ouvertes.fr/inria-00542784

E. A. Lippmann, J. W. Lippmann, D. J. Haines, J. Fried, K. Korba et al., Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation, 3rd symposium on Recent Advances in Intrusion Detection, pp.162-182, 2000.
DOI : 10.1007/3-540-39945-3_11

E. Livshits, . B. Lam-05-]-v, M. S. Livshits, and . Lam, Finding security errors in Java program with static analysis, Proc. 14th Usenix Security Symposium, 2005.

E. A. Ludinard, . 12a-]-r, E. Ludinard, F. Totel, V. Tronel et al., Detecting attacks against data in web applications, 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS), p.12, 2012.
DOI : 10.1109/CRISIS.2012.6378943

URL : https://hal.archives-ouvertes.fr/hal-00735997

E. A. Ludinard, . 12b-]-r, E. Ludinard, F. Totel, V. Tronel et al., Detecting attacks against data in web applications, 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS)
DOI : 10.1109/CRISIS.2012.6378943

URL : https://hal.archives-ouvertes.fr/hal-00735997

. Madeira, H. Madeira, M. Vieira, and D. Costa, On the emulation of software faults by software fault injection, Proceeding International Conference on Dependable Systems and Networks. DSN 2000, 2000.
DOI : 10.1109/ICDSN.2000.857571

A. D. Maftia-et, R. Powel, and . Strout, Conceptual Model and Architecture of MAFTIA Automatic generation of XSS and SQL injection attacks with goal-directed model checking, USENIX Security, 2003.

E. A. Massicotte, F. Massicotte, Y. Gagnon, L. C. Labiche, M. Briand et al., Automatic Evaluation of Intrusion Detection Systems, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), pp.361-370, 2006.
DOI : 10.1109/ACSAC.2006.15

. R. Marty, Thor : A Tool to Test Intrusion Detection Systems by Variations of Attacks, 2002.

. Mauw, S. Mauw, and M. Oostdijk, Foundations of Attack Trees, Information Security and Cryptology-ICISC 2005, pp.186-198
DOI : 10.1007/11734727_17

]. J. Mchugh-00 and . Mchugh, Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory, ACM Transactions on Information and System Security, vol.3, issue.4, pp.262-294, 2000.
DOI : 10.1145/382912.382923

]. B. Meyer-92 and . Meyer, Object-oriented software construction, 1992.

E. A. Mouelhi, T. Mouelhi, Y. Le-traon, E. Abgrall, B. Baudry et al., Tailored Shielding and Bypass Testing of Web Applications, 2011 Fourth IEEE International Conference on Software Testing, Verification and Validation, 2011.
DOI : 10.1109/ICST.2011.56

URL : https://hal.archives-ouvertes.fr/hal-00646424

E. A. Mukherjee, L. Mukherjee, K. N. Todd-heberlein, and . Levitt, Network intrusion detection, IEEE Network, vol.8, issue.3, pp.26-41, 1994.
DOI : 10.1109/65.283931

E. A. Mutz, G. Mutz, R. Vigna, and . Kemmerer, An experience developping an IDS stimulator for the black box testing of network intrusion detection system, Annual Computer Security Applications Conference, pp.374-383, 2003.

A. G. Munz-et, S. Munz, G. Li, and . Carle, Traffic Anomaly Detection Using k-means Clustering, GI/ITG Workshop MMBnet, 2007.

W. Mutz-et-almutz, G. Robertson, R. Vigna, and . Kemmerer, Exploiting Execution Context for the Detection of Anomalous System Calls, Proceeding of the 10th International Symposium on Recent Advances in Intrusion Detection (RAID'2007), 2007.

. Neves, N. Al-neves, J. Antunes, M. Correia, P. Verãssimo et al., Using Attack Injection to Discover New Vulnerabilities, International Conference on Dependable Systems and Networks (DSN'06), 2006.
DOI : 10.1109/DSN.2006.72

E. A. Newsome, B. Newsome, E. D. Karp, and . Song, Polygraph : Automatically generating signatures for polymor-phic worms, Proceedings of the 2005 IEEE Symposium on Security and Privacy, pp.226-241, 2005.

E. Nguyen, S. Al-nguyen-tuong, D. Guarnieri, J. Greene, D. Shirley et al., Automatically Hardening Web Applications Using Precise Tainting, IFIP Security 2005, 2005.

E. A. Noel, S. Noel, S. Jajodia, and A. Singhal, Measuring Security Risk of Networks Using Attack Graphs, International Journal of Next-Generation Computing, vol.1, issue.1, pp.135-147

. G. Noseevich, A. Noseevich, and . Petukhov, Detecting Insufficient Access Control in Web Applications, 2011 First SysSec Workshop, pp.11-18, 2011.
DOI : 10.1109/SysSec.2011.28

E. A. Ortalo, Y. Ortalo, M. Deswarte, and . Kaaniche, Experimenting with quantitative evaluation tools for monitoring operational security, IEEE Transactions on Software Engineering, vol.25, issue.5, pp.633-650, 1999.
DOI : 10.1109/32.815323

E. Phillips, ]. C. Swiler-98, L. P. Phillips, and . Swiler, A graph-based system for network-vulnerability analysis, Proceedings of the 1998 workshop on New security paradigms , NSPW '98, pp.71-79, 1998.
DOI : 10.1145/310889.310919

E. Pietrazek, . Berghe-05-]-t, C. V. Pietraszek, and . Berghe, Defending Against Injection Attacks Through Context-Sensitive String Evaluation, Recent Advances in Intrusion Detection 2005 (RAID), 2005.
DOI : 10.1007/11663812_7

]. P. Proctor-01 and . Proctor, Practical Intrusion Detection Handbook " . Upper Saddle River, 2001.

E. A. Puketza, N. J. Puketza, . Zhang, . Kui, M. ;. Chung et al., A methodology for testing intrusion detection systems, IEEE Transactions on Software Engineering, vol.22, issue.10, pp.719-729, 1996.
DOI : 10.1109/32.544350

E. A. Robertson, G. Robertson, C. Vigna, R. A. Kruegel, and . Kemmerer, Using generalization and characterization techniques in the anomaly-based detection of web attacks, Proceedings of the Network and Distributed System Security Symposium, 2006.

E. A. Saniee, J. Saniee, Z. Habibi, E. M. Barzegar, and . Sergi, A parallel genetic local search algorithm for intrusion detection in computer networks, CSICC, 2007.

E. A. Sekar, A. Sekar, J. Gupta, T. Frullo, A. Shanbhag et al., Specification-based anomaly detection, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.265-274, 2002.
DOI : 10.1145/586110.586146

E. A. Sheyner, O. Sheyner, J. Haines, S. Jha, R. Lippmann et al., Automated generation and analysis of attack graphs, Proceedings 2002 IEEE Symposium on Security and Privacy, pp.254-265, 2002.
DOI : 10.1109/SECPRI.2002.1004377

E. A. Stefan, E. Stefan, C. Kirda, N. Kruegel, and . Jovanovic, SecuBat : a web vulnerability scanner, Proceedings of the 15th international conference on World Wide Web (WWW '06), 2006.

[. Tombini, H. Debar, L. Mé, and M. Ducassé, A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic, 20th Annual Computer Security Applications Conference, pp.428-437, 2004.
DOI : 10.1109/CSAC.2004.4

URL : https://hal.archives-ouvertes.fr/hal-00356403

E. A. Valdes, D. Valdes, T. Anderson, and . Frivold, Next-generation intrusion detection expert system (nides) : A summary, 1995.

W. Vigna-et-alvigna, V. Robertson, R. A. Kher, and . Kemmerer, A stateful intrusion detection system for world-wide web servers, Proceedings of the Annual Computer Security Applications Conference, pp.34-43, 2003.

W. Vigna-et-alvigna, D. Robertson, and . Balzarotti, Testing network based intrusion detection signatures using mutant exploits, Proc. ACM conference on Computer and communications security, pp.21-30, 2004.

E. A. Warrender, S. Warrender, B. Forrest, and . Pearlmutter, Detecting intrusions using system calls: alternative data models, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344), pp.133-145, 1999.
DOI : 10.1109/SECPRI.1999.766910

E. Wassermann, . Su-07-]-g, Z. Wassermann, and . Su, Sound and precise analysis of web applications for injection vulnerabilities, ACM SIGPLAN Notices, vol.42, issue.6, pp.32-41, 2007.
DOI : 10.1145/1273442.1250739

E. Xie, ]. Y. Aiken-06, A. Xie, and . Aiken, Static detection of vulnerabilities in scripting languages, Proc. 15th USENIX Security Symposium, pp.179-192, 2006.

[. Yeung and Y. Ding, Host-based intrusion detection using dynamic and static behavioral models, Pattern Recognition, vol.36, issue.1, pp.229-243, 2003.
DOI : 10.1016/S0031-3203(02)00026-2