D. E. Meddour, A. Kortebi, and R. Boutaba, Mesh-based broadband home network solution: setup and experiments, International Conference in Communications (ICC), pp.1-5, 2010.
DOI : 10.1109/icc.2010.5502620

L. Roberts, Beyond Moore's law: Internet growth trends, Computer, pp.117-119, 2000.
DOI : 10.1109/2.963131

, Le guide du SNPTV 2016, 2015.

. Verizon, State of the Market: Internet of Things, 2016.

. Sandvine, 2015-Global Internet Phenomena Asia-Pacific & Europe, 2015.

R. E. Grinter, W. K. Edwards, M. Chetty, E. S. Poole, J. Sung et al., The ins and outs of home networking: The case for useful and usable domestic networking, ACM Transactions on Computer-Human Interaction (TOCHI), vol.16, issue.2, pp.8-32, 2009.

S. Kiesler, B. Zdaniuk, V. Lundmark, and R. Kraut, Troubles with the Internet: The dynamics of help at home, Human-Computer Interaction, vol.15, issue.4, pp.323-351, 2000.

S. Sundaresan, Y. Grunenberger, N. Feamster, D. Papagiannaki, D. Levin et al., WTF? Locating performance problems in home networks, Georgia Institute of Technology, 2013.

, QoS scorecards for accessing fixed line services, Autorité de Régulation des Communications Electroniques et des Postes (ARCEP), 2016.

A. Kortebi, P. Le-dain, and F. Dure, Home network assistant: Towards better diagnostics and increased customer satisfaction, Global Information Infrastructure Symposium (GIIS), pp.1-6, 2013.
DOI : 10.1109/giis.2013.6684354

A. Kortebi, Z. Aouini, M. Juren, and J. Pazdera, Home Networks Traffic Monitoring Case Study: Anomaly Detection, Global Information Infrastructure and Networking Symposium (GIIS), pp.1-6, 2016.

A. Pekár and M. Chovanec, Survey of the issues surrounding network traffic monitoring, Wireless Communications, Networking and Mobile Computing, pp.1-8, 2015.

D. Joumblatt, R. Teixeira, J. Chandrashekar, and N. Taft, HostView: Annotating end-host performance measurements with user feedback, ACM SIGMETRICS Performance Evaluation Review, vol.38, issue.3, pp.43-48, 2011.
URL : https://hal.archives-ouvertes.fr/hal-01151873

T. Karagiannis, E. Athanasopoulos, C. Gkantsidis, and P. Key, HomeMaestro: Order from Chaos in Home Networks, Microsoft Research, 2008.

L. Dicioccio, R. Teixeira, and C. Rosenberg, Measuring home networks with homenet profiler, International Conference on Passive and Active Network Measurement, pp.176-186, 2013.

C. Kreibich, N. Weaver, B. Nechaev, and V. Paxson, Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, pp.246-259, 2010.

A. Reggani, F. Schneider, and R. Teixeira, Tracking application network performance in Home Gateways, Wireless Communications and Mobile Computing Conference (IWCMC), pp.1150-1155, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00825277

S. Sundaresan, S. Burnett, N. Feamster, and W. D. Donato, BISmark: A Testbed for Deploying Measurements and Applications in Broadband Access Networks, USENIX Annual Technical Conference, pp.383-394, 2014.

L. Deri, M. Martinelli, T. Bujlow, and A. Cardigliano, «ndpi: Open-source high-speed deep packet inspection, Wireless Communications and Mobile Computing Conference (IWCMC), pp.617-622, 2014.
DOI : 10.1109/iwcmc.2014.6906427

S. Alcock and R. Nelson, Libprotoident: Traffic classification using lightweight packet inspection, 2012.

, The French Constitutional Council, 2009.

L. Bernaille and R. Teixeira, Early recognition of encrypted applications, International Conference on Passive and Active Network Measurement, pp.165-175, 2007.
URL : https://hal.archives-ouvertes.fr/hal-01097556

C. Bacquet, A. N. Zincir-heywood, and M. I. Heywood, «An investigation of multi-objective genetic algorithms for encrypted traffic identification,» Computational Intelligence in Security for Information Systems, pp.93-100, 2009.

R. Alshammari and A. N. Zincir-heywood, A preliminary performance comparison of two feature sets for encrypted traffic classification, Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS'08, pp.203-210, 2008.

R. Alshammari and A. N. Zincir-heywood, Machine learning based encrypted traffic classification: Identifying ssh and skype, pp.1-8, 2009.

R. Bar-yanai, M. Langberg, D. Peleg, and L. Roditty, Realtime classification for encrypted traffic, International Symposium on Experimental Algorithms, pp.373-385, 2010.

A. Dainotti, A. Pescapé, and C. Sansone, «Early classification of network traffic through multiclassification, » International Workshop on Traffic Monitoring and Analysis, pp.122-135, 2011.

D. J. and .. A. Arndt, A comparison of three machine learning techniques for encrypted network traffic analysis, Computational Intelligence for Security and Defense Applications (CISDA), pp.107-114, 2011.

Y. Okada, S. Ata, N. Nakamura, Y. Nakahira, and I. Oka, Application identification from encrypted traffic based on characteristic changes by encryption, Communications Quality and Reliability, pp.1-6, 2011.

C. Bacquet, A. N. Zincir-heywood, and M. I. Heywood, «Genetic optimization and hierarchical clustering applied to encrypted traffic identification,» Computational Intelligence in Cyber Security (CICS), pp.194-201, 2011.

Y. Du and R. Zhang, Design of a method for encrypted P2P traffic identification using Kmeans algorithm, Telecommunication Systems, vol.53, issue.1, pp.163-168, 2013.

H. A. Ibrahim, O. R. Zuobi, M. A. Al-namari, G. Mohamedali, and A. A. Abdalla, Internet traffic classification using machine learning approach: Datasets validation issues, Basic Sciences and Engineering Studies (SGCAC), pp.158-166, 2016.

L. Deri, nProbe: an open source netflow probe for gigabit networks, TERENA Networking Conference, pp.1-4, 2003.

K. P. Gummadi, S. Saroiu, and S. D. Gribble, King: Estimating latency between arbitrary internet end hosts, Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, pp.5-18, 2002.

M. Jain and C. Dovrolis, Pathload: A measurement tool for end-to-end available bandwidth, Proceedings of Passive and Active Measurements (PAM) Workshop, pp.14-25, 2002.

Y. Zhang, L. Breslau, V. Paxson, and S. Shenker, On the characteristics and origins of internet flow rates, ACM SIGCOMM Computer Communication Review, vol.32, issue.4, pp.309-322, 2002.

B. Claise, Cisco systems netflow services export version 9, 2004.

B. Claise, B. Trammell, and P. Aitken, RFC 7011-Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information, 2013.

F. Gringoli, L. Salgarelli, M. Dusi, N. Cascarano, and F. Risso, Gt: picking up the truth from the ground for internet traffic, ACM SIGCOMM Computer Communication Review, vol.39, issue.5, pp.12-18, 2009.

V. Carela-español, T. Bujlow, and P. Barlet-ros, Is our ground-truth for traffic classification reliable?, International Conference on Passive and Active Network Measurement, pp.98-108, 2014.

K. L. Calvert, W. K. Edwards, N. Feamster, R. E. Grinter, Y. Deng et al., Instrumenting home networks, ACM SIGCOMM Computer Communication Review, vol.41, issue.1, pp.84-89, 2011.

J. Whiteaker, F. Schneider, R. Teixeira, C. Diot, A. Soule et al., Expanding home services with advanced gateways, ACM SIGCOMM Computer Communication Review, vol.42, issue.5, pp.37-43, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00835041

U. Pierre and M. Curie, D2.2 Design document of gateway-centric monitoring tools, 2013.
URL : https://hal.archives-ouvertes.fr/hal-02007247

S. Hätönen, A. Nyrhinen, L. Eggert, S. Strowes, P. Sarolahti et al., An experimental study of home gateway characteristics, Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, pp.260-266, 2010.

K. C. Claffy, H. W. Braun, and G. C. Polyzos, A parameterizable methodology for Internet traffic flow profiling, IEEE Journal on selected areas in communications, vol.13, issue.8, pp.1481-1494, 1995.

M. Kaplow, FOKUS-Fraunhofer Institute for Open Communication Systems, 2017.

E. Zürich, , p.12, 2017.

, WAND-WAND Research Group, p.12, 2017.

C. M. Inacio and B. Trammell, Yaf: yet another flowmeter, Proceedings of LISA'10: 24th Large Installation System Administration Conference, pp.107-115, 2010.

S. Alcock, P. Lorier, and R. Nelson, Libtrace: a packet capture and analysis library, ACM SIGCOMM Computer Communication Review, vol.42, issue.2, pp.42-48, 2012.

L. Deri, Improving passive packet capture: Beyond device polling, pp.85-93, 2004.

L. Rizzo, Netmap: a novel framework for fast packet I/O, 21st USENIX Security Symposium (USENIX Security 12), pp.101-112, 2012.

, DPDK-Getting Started Guide, 2014.

A. Dainotti, A. Pescape, and K. C. Claffy, Issues and future directions in traffic classification, IEEE Network, vol.26, issue.1, pp.36-40, 2012.

J. Micheel, S. Donnelly, and I. Graham, Precision timestamping of network packets, Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement, pp.273-277, 2001.

T. Zseby, M. Molina, N. Duffield, S. Niccolini, and F. Raspall, RFC5475-Sampling and Filtering Techniques for IP Packet Selection, 2009.

B. Claise, G. Dhandapani, P. Aitken, and S. Yates, RFC 6313-Export of structured data in IP Flow Information Export (IPFIX), 2011.

R. Stewart, M. Ramalho, Q. Xie, M. Tuexen, and P. Conrad, RFC 3758-Stream Control Transmission Protocol (SCTP) Partial Reliability Extension, 2004.

J. Fan, J. Xu, M. H. Ammar, and S. B. Moon, Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme, Computer Networks, vol.46, issue.2, pp.253-272, 2004.

B. Trammell, A. Wagner, and B. Claise, RFC 7015-Flow aggregation for the IP flow information export protocol, 2013.

, Summary of Anonymization Best Practice Techniques, 2016.

C. Schmoll, S. Teofili, E. Delzeri, G. Bianchi, I. Gojmerac et al., State of the art on data protection algorithms for monitoring systems. PRISM. IST-2007-215350, Data Protection Algorithms, 2008.

T. Bujlow, K. Balachandran, T. Riaz, and J. M. Pedersen, Volunteer-Based System for classification of traffic in computer networks, 19th Telecommunications Forum (TELFOR), pp.210-213, 2011.

D. Moore, K. Keys, R. Koga, E. Lagache, and K. C. Claffy, The coralreef software suite as a tool for system and network administrators, Proceedings of the 15th USENIX conference on System administration, pp.133-144, 2001.

A. W. Moore and K. Papagiannaki, Toward the accurate identification of network applications, International Workshop on Passive and Active Network Measurement, pp.41-54, 2005.

T. Bhatia, , 2012.

J. Levandoski, E. Sommer, and S. , Application Layer Packet Classifier for Linux, 2009.

T. Bujlow, V. Carela-español, and P. Barlet-ros, Independent comparison of popular DPI tools for traffic classification, Computer Networks, vol.76, issue.C, pp.75-89, 2015.

M. Finsterbusch, C. Richter, E. Rocha, J. A. Muller, and K. Hanssgen, A survey of payloadbased traffic classification approaches, IEEE Communications Surveys & Tutorials, vol.16, issue.2, pp.1135-1156, 2014.

N. Cascarano, A. Este, F. Gringoli, F. Risso, and L. Salgarelli, An experimental evaluation of the computational cost of a DPI traffic classifier, Global Telecommunications Conference (GLOBECOM), pp.1-8, 2009.

N. Cascarano, L. Ciminiera, and F. Risso, Improving cost and accuracy of DPI traffic classifiers, Proceedings of the 2010 ACM Symposium on Applied Computing, pp.641-646, 2010.

C. V. Wright, F. Monrose, and G. M. Masson, On inferring application protocol behaviors in encrypted network traffic, Journal of Machine Learning Research, vol.7, pp.2745-2769, 2006.

Y. Kumano, S. Ata, N. Nakamura, Y. Nakahira, and I. Oka, Towards real-time processing for application identification of encrypted traffic, Interntional conference on Computing, Networking and Communications (ICNC), pp.136-140, 2014.

T. Bujlow, T. Riaz, and J. M. Pedersen, A method for classification of network traffic based on C5. 0 Machine Learning Algorithm, International conference on Computing, Networking and Communications (ICNC), pp.237-241, 2012.

V. Carela-español, P. Barlet-ros, A. Bifet, and K. Fukuda, A streaming flow-based technique for traffic classification applied to 12+ 1 years of Internet traffic, Telecommunication Systems, vol.63, issue.2, pp.191-204, 2016.

T. T. Nguyen and G. Armitage, A survey of techniques for internet traffic classification using machine learning, IEEE Communications Surveys & Tutorials, vol.10, issue.4, pp.56-76, 2008.

P. Velan, M. ?ermák, P. ?eleda, and M. Dra?ar, A survey of methods for encrypted traffic classification and analysis, International Journal of Network Management, vol.25, issue.5, pp.355-374, 2015.

J. Khalife, A. Hajjar, and J. Diaz-verdejo, A multilevel taxonomy and requirements for an optimal traffic-classification model, International Journal of Network Management, vol.24, issue.2, pp.101-120, 2014.
DOI : 10.1002/nem.1855

A. Moore, D. Zuev, and M. Crogan, Discriminators for use in flow-based classification, 2005.

J. R. Quinlan, C4. 5: programs for machine learning, 2014.

M. S. Seddiki, M. Shahbaz, S. Donovan, S. Grover, M. Park et al., FlowQoS: QoS for the rest of us, Proceedings of the third workshop on Hot topics in software defined networking, pp.207-208, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01071445

P. Arcaini, E. Riccobene, and P. Scandurra, Modeling and analyzing MAPE-K feedback loops for self-adaptation, International Symposium on Software Engineering for Adaptive and Self-Managing Systems, pp.13-23, 2015.

L. Deri, How to Enforce Layer-7 Traffic Policies Using ntopng, 2015.

A. Dainotti, W. D. Donato, and A. Pescapé, A community-oriented traffic classification platform, International Workshop on Traffic Monitoring and Analysis, pp.64-74, 2009.

F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion et al., Scikit-learn: Machine learning in Python, Journal of Machine Learning Research (JMLR), vol.12, pp.2825-2830, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00650905

M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann et al., The WEKA data mining software: an update, ACM SIGKDD explorations newsletter, pp.10-18, 2009.

A. Z. Kortebi, C. Delahaye, J. P. Javaudin, and Y. Ghamri-doudane, A platform for home network traffic monitoring, IFIP/IEEE Symposium on Integrated Network and Service Management (IM), pp.895-896, 2017.

, Why nProbe+JSON+ZMQ instead of native sFlow/NetFlow support in ntopng?

L. Deri, M. Martinelli, and A. Cardigliano, Realtime High-Speed Network Traffic Monitoring Using ntopng, USENIX Conference on Large Installation System Administration, pp.70-80, 2014.

A. Lahmadi, F. Beck, E. Finickel, and O. Festor, A platform for the analysis and visualization of network flow data of android environments, IFIP/IEEE International Symposium on Integrated Network Management (IM), pp.1129-1130, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01242911

J. Khalife, A. Hajjar, and J. Diaz-verdejo, A multilevel taxonomy and requirements for an optimal traffic-classification model, International Journal of Network Management, vol.24, issue.2, pp.101-120, 2014.
DOI : 10.1002/nem.1855