S. Panchen, P. Phaal, and N. Mckee, Inmon corporation's sflow : A method for monitoring traffic in switched and routed networks, 2001.

J. Quittek, T. Zseby, B. Claise, and S. Zander, Requirements for ip flow information export (ipfix), 2004.

. Akamai, L'état d'internet, 2017.

T. Back and U. Hand, Worldwide DDoS Attacks & Cyber Insights Research Report, 2017.

M. Roesch, Snort : Lightweight Intrusion Detection for Networks, LISA '99 : 13th Systems Administration Conference, pp.229-238, 1999.

V. Paxson, Bro : a system for detecting network intruders in real-time, Comput. Netw, vol.31, issue.23-24, pp.2435-2463, 1999.

W. Scheirer and M. Chuah, Syntax vs. semantics : competing approaches to dynamic network intrusion detection, International Journal of Security and Networks, vol.3, issue.1, pp.24-35, 2008.

I. S. Yoo, Protocol anomaly detection and verification, Assur. Work. 2004. Proc. from, pp.10-11, 2004.

R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, A. Tiwari et al., Specification-based Anomaly Detection : A New Approach for Detecting Network Intrusions, CCS '02 : Proceedings of the 9th ACM Conference on Computer and communications security, pp.265-274, 2002.

G. Poojitha, K. Kumar, and P. Jayaramireddy, Intrusion Detection using Artificial Neural Network, Second International conference on Computing, Communication and Networking Technologies, pp.1-7, 2010.

S. Hawkins, H. He, G. Williams, and R. Baxter, Outlier Detection Using Replicator Neural Networks, Data Warehousing and Knowledge Discovery, pp.170-180, 2002.

J. Sun, H. Yang, J. Tian, and F. Wu, Intrusion Detection Method Based on Wavelet Neural Network, 2009 Second International Workshop on Knowledge Discovery and Data Mining, pp.851-854, 2009.

S. C. Lee and D. V. Heinbuch, Training a Neural-Network Based Intrusion Detector to Recognize Novel Attacks, IEEE Transactions on Systems, Man, and Cybernetics, vol.31, issue.4, pp.294-299, 2001.

X. Tong, Z. Wang, and H. Yu, A research using hybrid RBF/Elman neural networks for intrusion detection system secure model, Computer Physics Communications, vol.180, issue.10, pp.1795-1801, 2009.

R. C. Aygun and A. G. Yavuz, Network Anomaly Detection with Stochastically Improved Autoencoder Based Models, 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), pp.193-198, 2017.

C. Cortes and V. Vapnik, Support-Vector Networks, Machine Learning, vol.20, pp.273-297, 1995.

A. Aizerman, E. M. Braverman, and L. I. Rozoner, Theoretical Foundations of the Potential Function Method in Pattern Recognition Learning, Automation and Remote Control, vol.25, pp.821-837, 1964.

R. Perdisci, O. Gu, and W. Lee, Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems, Sixth International Conference on Data Mining (ICDM'06), pp.488-498, 2006.

R. Perdisci, D. Ariu, P. Fogla, G. Giacinto, and W. Lee, McPAD : A Multiple Classifier System for Accurate Payload-based Anomaly Detection, Computer Networks, vol.53, issue.6, pp.864-881, 2009.

L. Khan, M. Awad, and B. Thuraisingham, A new intrusion detection system using support vector machines and hierarchical clustering, The VLDB Journal, vol.16, issue.4, pp.507-521, 2006.

D. Barbará, J. Couto, S. Jajodia, and N. Wu, Adam, ACM SIGMOD Record, vol.30, issue.4, p.15, 2001.

M. V. Mahoney and P. K. Chan, Learning Rules for Anomaly Detection of Hostile Network Traffic, International Conference on Data Mining (ICDM), pp.601-604, 2003.

M. Su, G. Yu, and C. Lin, A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach, Computers & Security, vol.28, issue.5, pp.301-309, 2009.

P. A. Kumar and S. Selvakumar, Distributed denial of service attack detection using an ensemble of neural classifier, Computer Communications, vol.34, issue.11, pp.1328-1341, 2011.

J. Vanerio and P. Casas, Ensemble-learning Approaches for Network Security and Anomaly Detection, Proceedings of the Workshop on Big Data Analytics and Machine Learning for Data Communication Networks, pp.1-6, 2017.

H. H. Nguyen, N. Harbi, and J. Darmont, An Efficient Local Region and ClusteringBased Ensemble System for Intrusion Detection, Proceedings of the 15th Symposium on International Database Engineering & Applications-IDEAS '11, p.185, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00631503

J. Song, Z. Zhu, P. Scully, and C. Price, Modified Mutual Information-based Feature Selection for Intrusion Detection Systems in Decision Tree Learning, Journal of Computers, vol.9, issue.7, pp.1542-1546, 2014.

Y. Qiao, X. W. Xin, Y. Bin, and S. Ge, Anomaly Intrusion Detection Method Based on Rough Set Theory, Electronics Letters, vol.38, issue.13, pp.663-664, 2002.

J. Xu and C. Shelton, Intrusion Detection using Continuous Time Bayesian Networks, Journal of Artificial Intelligence Research, vol.39, pp.745-774, 2010.

R. Fontugne, P. Borgnat, P. Abry, and K. Fukuda, MAWILab : Combining Diverse Anomaly Detectors for Automated Anomaly Labeling and Performance Benchmarking, Proceedings of the 6th International Conference on Emerging Networking Experiments and Technologies, 2010.
URL : https://hal.archives-ouvertes.fr/ensl-00552071

, Lbnl dataset

M. Yu, A Nonparametric Adaptive Cusum Method And Its Application In Network Anomaly Detection, International Journal of Advancements in Computing Technology, vol.4, issue.1, pp.280-288, 2012.

A. Soule, K. Salamatian, and N. Taft, Combining Filtering and Statistical Methods for Anomaly Detection, Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement, vol.5, pp.331-334, 2005.
URL : https://hal.archives-ouvertes.fr/hal-01489028

A. Lakhina, M. Crovella, and C. Diot, Mining Anomalies Using Traffic Feature Distributions, ACM SIGCOMM Computer Communication Review, vol.35, issue.4, p.217, 2005.

X. Li, F. Bian, M. Crovella, C. Diot, R. Govindan et al., Detection and Identification of Network Anomalies Using Sketch Subspaces, Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, pp.147-152, 2006.

M. Celenk, T. Conley, J. Willis, and J. Graham, Predictive Network Anomaly Detection and Visualization, IEEE Transactions on Information Forensics and Security, vol.5, issue.2, pp.288-299, 2010.

B. Tellenbach, M. Burkhart, D. Schatzmann, D. Gugelmann, and D. Sornette, Accurate network anomaly classification with generalized entropy metrics, Computer Networks, vol.55, issue.15, pp.3485-3502, 2011.

C. Callegari, S. Giordano, and M. Pagano, Entropy-based Network Anomaly Detection, 2017 International Conference on Computing, Networking and Communications (ICNC), pp.334-340, 2017.

P. Casas, J. Mazel, and P. Owezarski, Unsupervised Network Intrusion Detection Systems : Detecting the Unknown without Knowledge, Computer Communications, vol.35, issue.7, pp.772-783, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00736278

M. V. Mahoney and P. K. Chan, PHAD : Packet Header Anomaly Detection for Identifying Hostile Network Traffic, 2001.

C. Krügel, T. Toth, and E. Kirda, Service Specific Anomaly Detection for Network Intrusion Detection, Proceedings of the 2002 ACM symposium on, pp.201-208, 2002.

D. Yeung and C. Chow, Object recognition supported by user interaction for service robots, vol.4, pp.385-388, 2002.

D. Anderson, T. Frivold, and A. Valdes, Next-generation Intrusion Detection Expert System (NIDES) : A summary, 1995.

D. Anderson, T. F. Lunt, H. Javitz, A. Tamaru, and A. Valdes, Detecting Unusual Program Behavior Using the Stastistical Component of the Next-generation Intrusion Detection Expert System (NIDES), Computer Science Laboratory SRI-CSL, issue.910097, pp.6-95, 1995.

P. Porras and P. G. Neumann, EMERALD : Event Monitoring Enabling Responses to Anomalous Live Disturbances, Proc. 20th NIST-{NCSC} National Information Systems Security Conference, pp.353-365, 1997.

Z. Chen, C. K. Yeo, B. S. Lee, and C. T. Lau, A Novel Anomaly Detection System using Feature-based MSPCA with Sketch, 2017 26th Wireless and Optical Communication Conference (WOCC), pp.1-6, 2017.

G. Liu, Z. Yi, and S. Yang, A hierarchical intrusion detection model based on the PCA neural networks, Neurocomputing, vol.70, issue.7-9, pp.1561-1568, 2007.

D. Ariu, R. Tronci, and G. Giacinto, HMMPayl : An intrusion detection system based on Hidden Markov Models, Computers & Security, vol.30, issue.4, pp.221-241, 2011.

W. Lu and A. A. Ghorbani, Network Anomaly Detection Based on Wavelet Analysis, EURASIP Journal on Advances in Signal Processing, issue.1, p.837601, 2009.

V. Hautamäki, I. Kärkkäinen, and P. Fränti, Outlier Detection Using k-Nearest Neighbour Graph, Proceedings of the 17th International Conference on Pattern Recognition (ICPR'04), vol.3, pp.430-433, 2004.

U. K. Archive, KDD Cup 1999 Data, pp.2018-2019

M. M. Breunig, H. Kriegel, R. T. Ng, and J. Sander, LOF : Identifying DensityBased Local Outliers, Proceedings of the 2000 ACM Sigmod International Conference on Management of Data, pp.1-12, 2000.

D. Pokrajac, A. Lazarevic, and L. Latecki, Incremental Local Outlier Detection for Data Streams, 2007 IEEE Symposium on Computational Intelligence and Data Mining, pp.504-515, 2007.

L. Ertöz, E. Eilertson, A. Lazarevic, P. N. Tan, V. Kumar et al., MINDS-Minnesota Intrusion Detection System, pp.199-218, 2004.

V. Chandola, E. Eilertson, and L. Ert, Data Mining for Cyber Security, Data Warehousing and Data Mining Techniques for Computer Security, pp.1-20, 2006.

A. Ghoting, S. Parthasarathy, and M. E. Otey, Fast Mining of Distance-Based Outliers in High-Dimensional Datasets, Data Mining and Knowledge Discovery, vol.16, issue.3, pp.349-364, 2008.

E. M. Knorr and R. T. Ng, Algorithms for Mining Distance-Based Outliers in Large Datasets, 24th International Conference on Very Large Data Bases, pp.392-403, 1998.

S. Bay and M. Schwabacher, Mining Distance-Based Outliers in Near Linear Time with Randomization and a Simple Pruning Rule, Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp.29-38, 2003.

J. L. Bentley, Multidimensional Binary Search Trees Used for Associative Searching, Communications of the ACM, vol.18, issue.9, pp.509-517, 1975.

A. Guttman, R-trees : A Dynamic Index Structure for Spatial Searching, Proceedings of the 1984 ACM SIGMOD International Conference on Management of Data, pp.47-57, 1984.

S. Berchtold, D. A. Keim, and H. Kriegel, The X-tree : An Index Structure for High-Dimensional Data, Proceedings of the 22th International Conference on Very Large Data Bases, pp.28-39, 1996.

M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, Survey on Incremental Approaches for Network Anomaly Detection, International Journal of Communication Networks and Information Security, vol.3, issue.3, pp.226-239, 2011.

S. R. Gaddam, V. V. Phoha, and K. S. Balagani, K-Means+ID3 : A Novel Method for Supervised Anomaly Detection by Cascading K-Means Clustering and ID3 Decision Tree Learning Methods, IEEE Transactions on Knowledge and Data Engineering, vol.19, issue.3, pp.345-354, 2007.

M. Ester, H. P. Kriegel, J. Sander, and X. Xu, A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise, Second International Conference on Knowledge Discovery and Data Mining, pp.226-231, 1996.

J. Dromard and P. Owezarski, Online and Scalable Unsupervised Network Anomaly Detection Method, vol.14, pp.34-47, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01406273

X. Zhao, G. Wang, and Z. Li, Unsupervised Network Anomaly Detection Based on Abnormality Weights and Subspace Clustering, Sixth International Conference on Information Science and Technology, pp.482-486, 2016.

L. Portnoy, E. Eleazar, and S. Stolfo, Intrusion Detection with Unlabeled Data Using Clustering, Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA'2001), pp.1-14, 2001.

S. Jiang, X. Song, H. Wang, J. J. Han, and Q. H. Li, A clustering-based method for unsupervised intrusion detections, Pattern Recognition Letters, vol.27, issue.7, pp.802-810, 2006.

K. Leung and C. Leckie, Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters, Proceedings of the Twenty-eighth Australasian Conference on Computer Science, vol.38, pp.333-342, 2005.

H. S. Nagesh, S. Goil, and A. Choudhary, Scalable Parallel Subspace Clustering Algorithm for Massive Data Sets, Proceedings 2000 International Conference on Parallel Processing, pp.477-484, 2000.

R. Agrawal, J. Gehrke, D. Gunopulos, and P. Raghavan, Automatic Subspace Clustering of High Dimensional Data for Data Mining Applications, ACM SIGMOD Record, vol.27, issue.2, pp.94-105, 1998.

J. Han, J. Pei, and Y. Yin, Mining Frequent Patterns without Candidate Generation, ACM SIGMOD Record, vol.29, issue.2, pp.1-12, 2000.

N. Nastaiinullah and .. P. Kurniati, Anomaly Detection on Intrusion Detection System Using CLIQUE Partitioning, 2014 2nd International Conference on Information and Communication Technology (ICoICT), pp.7-12, 2014.

M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, An Effective Unsupervised Network Anomaly Detection Method, Proceedings of the International Conference on Advances in Computing, Communications and Informatics, p.533, 2012.

F. Amiri, M. R. Yousefi, C. Lucas, A. Shakery, and N. Yazdani, Mutual information-based feature selection for intrusion detection systems, Journal of Network and Computer Applications, vol.34, issue.4, pp.1184-1199, 2011.

M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, A multi-step outlier-based anomaly detection approach to network-wide traffic, Information Sciences, vol.348, pp.243-271, 2016.

K. Labib and R. Vemuri, NSOM : A Real-Time Network-Based Intrusion Detection System Using Self-Organizing Maps, Networks and Security, 2002.

M. Amini, R. Jalili, and H. R. Shahriari, RT-UNNID : A practical solution to real-time network-based intrusion detection using unsupervised neural networks, Computers and Security, vol.25, issue.6, pp.459-468, 2006.

C. Wagner, R. State, T. Engel, and M. Learning, Machine Learning Approach for IP-Flow Record Anomaly Detection, pp.28-39, 2011.
URL : https://hal.archives-ouvertes.fr/inria-00613602

M. E. Otey, A. Ghoting, and S. Parthasarathy, Fast Distributed Outlier Detection in Mixed-Attribute Data Sets, Data Mining and Knowledge Discovery, vol.12, issue.2-3, pp.203-228, 2006.

J. Song, H. Takakura, Y. Okabe, and K. Nakao, Toward a more practical unsupervised anomaly detection system, Information Sciences, vol.231, pp.4-14, 2013.

G. Fernandes, L. F. Carvalho, J. J. Rodrigues, and M. L. Proença, Network anomaly detection using IP flows with Principal Component Analysis and Ant Colony Optimization, Journal of Network and Computer Applications, vol.64, pp.1-11, 2016.

W. Lu and H. Tong, Detecting Network Anomalies Using CUSUM and EM Clustering, Proceedings of the 4th International Symposium on Advances in Computation and Intelligence, pp.297-308, 2009.

J. Zhang, M. Zulkernine, and A. Haque, Random-Forests-Based Network Intrusion Detection Systems, IEEE Transactions on Systems, Man, and Cybernetics, vol.38, issue.5, pp.649-659, 2008.

J. Zhang and M. Zulkernine, A Hybrid Network Intrusion Detection Technique Using Random Forests, First International Conference on Availability, Reliability and Security (ARES'06), pp.262-269, 2006.

K. Yamanishi and J. Takeuchi, Discovering Outlier Filtering Rules from Unlabeled Data, Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp.389-394, 2001.

B. Claise, Cisco systems netflow services export version 9, 2004.

Y. Chen and L. Tu, Density-Based Clustering for Real-Time Stream Data, Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, pp.133-142, 2007.

H. Zimek, A. ;. Schubert, and E. ;. Kriegel, A Survey on Unsupervised Outlier Detection in High-Dimensional Numerical Data, Wiley Periodicals, vol.4, issue.5, pp.363-387, 2012.

A. Shiravi, H. Shiravi, M. Tavallaee, and A. A. Ghorbani, Toward developing a systematic approach to generate benchmark datasets for intrusion detection, Computers & Security, vol.31, issue.3, pp.357-374, 2011.

I. Sharafaldin, A. H. Lashkari, A. A. Ghorbani, ;. Icissp, and . Cic, Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization, Proceedings of the 4th International Conference on Information Systems Security and Privacy, vol.1, pp.108-116, 2018.

, Ontic, pp.2017-2022

K. Nasr, A. A. Kalam, and C. Fraboul, Performance Analysis of Wireless Intrusion Detection Systems, Internet and Distributed Computing Systems : 5th International Conference, IDCS 2012, pp.238-252, 2012.

, DPDKCap, pp.2018-2020

, Fastnetmon

, Tcpreplay

E. Hernandez, M. C. Chidester, and A. D. George, Adaptive Sampling for Network Management, Journal of Network and Systems Management, vol.9, issue.4, pp.409-434, 2001.

B. Choi, J. Park, and Z. Zhang, Adaptive packet sampling for accurate and scalable flow measurement, Global Telecommunications Conference, 2004. GLOBECOM '04. IEEE, vol.3, pp.1448-1452, 2004.

M. Canini, D. Fayt, D. J. Millert, A. W. Mooret, and R. Bolla, Per flow packet sampling for high-speed network monitoring, 1st International Conference on Communication Systems and Networks and Workshops, 2009.