M. Roesch, USENIX LISA 15 House Advertisement, IEEE Software, vol.32, issue.5, pp.c4-c4, 2015.

K. Nam and K. Kim, A Study on SDN security enhancement using open source IDS/IPS Suricata, 2018 International Conference on Information and Communication Technology Convergence (ICTC), 2018.

S. Axelsson, The base-rate fallacy and the difficulty of intrusion detection, ACM Transactions on Information and System Security, vol.3, issue.3, pp.186-205, 2000.

M. Labonne, A. Olivereau, B. Polve, and D. Zeghlache, Unsupervised Protocol-based Intrusion Detection for Real-world Networks, 2020 International Conference on Computing, Networking and Communications (ICNC), p.2020, 2020.
URL : https://hal.archives-ouvertes.fr/cea-02555669

M. Labonne, A. Olivereau, and D. Zeghlache, Automatisation du processus d'entraînement d'un ensemble d'algorithmes de machine learning optimisés pour la détection d'intrusion, Proceedings of Journées C&ESAR 2018, vol.11, pp.1-10, 2018.

M. Labonne, A. Olivereau, B. Polve, and D. Zeghlache, A Cascade-structured Meta-Specialists Approach for Neural Network-based Intrusion Detection, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp.1-6, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02425973

M. Labonne, A. Olivereau, B. Polve, and D. Zeghlache, Unsupervised Protocol-based Intrusion Detection for Real-world Networks, 2020 International Conference on Computing, Networking and Communications (ICNC), 2020.
URL : https://hal.archives-ouvertes.fr/cea-02555669

M. Labonne, A. Olivereau, B. Polve, and D. Zeghlache, Unsupervised Protocol-based Intrusion Detection for Real-world Networks, 2020 International Conference on Computing, Networking and Communications (ICNC), pp.299-303, 2020.
URL : https://hal.archives-ouvertes.fr/cea-02555669

M. Labonne, C. Chatzinakis, and A. Olivereau, Predicting Bandwidth Utilization on Network Links Using Machine Learning, 2020 European Conference on Networks and Communications (EuCNC), 2020.

T. Kaur and I. Singh, Standardiza Tion Of Screening Technique For False Smut Of Rice, Progressive Agriculture, vol.17, issue.1, p.10, 2017.

J. P. Anderson, Computer Security Technology Planning Study. Volume 2, 1972.

J. P. Anderson, Computer security threat monitoring and surveillance, 1980.

D. E. Denning, An Intrusion-Detection Model, IEEE Transactions on Software Engineering, vol.SE-13, issue.2, pp.222-232, 1987.

F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion et al., Scikit-learn: Machine Learning in Python, Journal of Machine Learning Research, vol.12, pp.2825-2830, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00650905

M. Abadi, A. Agarwal, P. Barham, E. Brevdo, Z. Chen et al., Tensorflow: Large-scale machine learning on heterogeneous distributed systems, vol.3, p.2016

A. Paszke, S. Gross, S. Chintala, G. Chanan, E. Yang et al., Automatic differentiation in pytorch, p.4

M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann et al., The WEKA data mining software, ACM SIGKDD Explorations Newsletter, vol.11, issue.1, pp.10-18, 2009.

M. Ring, S. Wunderlich, D. Scheuring, D. Landes, and A. Hotho, A survey of network-based intrusion detection data sets, Computers & Security, vol.86, pp.147-167, 2019.

J. Song, H. Takakura, Y. Okabe, M. Eto, D. Inoue et al., Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation, Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security - BADGERS '11, pp.29-36, 2011.

A. Sperotto, R. Sadre, F. Van-vliet, and A. Pras, A Labeled Data Set for Flow-Based Intrusion Detection, IP Operations and Management, pp.39-50, 2009.

N. Moustafa and J. Slay, UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set), 2015 Military Communications and Information Systems Conference (MilCIS), vol.11, p.2015, 2015.

D. Proti?, Review of KDD Cup '99, NSL-KDD and Kyoto 2006+ datasets, Vojnotehnicki glasnik, vol.66, issue.3, pp.580-596, 2018.

. Maxime, Faivre, Maxime, for Léon Maxime, 2011.

M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, A detailed analysis of the KDD CUP 99 data set, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009.

I. Sharafaldin, A. Gharib, A. H. Lashkari, and A. A. Ghorbani, Towards a Reliable Intrusion Detection Benchmark Dataset, Software Networking, vol.2017, issue.1, pp.177-200, 2017.

A. Lashkari, G. Gil, M. Mamun, and A. Ghorbani, Characterization of tor traffic using time based features, vol.01, p.2017

R. Panigrahi and S. Borah, A detailed analysis of cicids2017 dataset for designing intrusion detection systems, vol.7, pp.479-482, 2018.

I. Sharafaldin, A. Habibi-lashkari, and A. A. Ghorbani, Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization, Proceedings of the 4th International Conference on Information Systems Security and Privacy, vol.01, pp.108-116, 2018.

L. Bottou, Large-Scale Machine Learning with Stochastic Gradient Descent, Proceedings of COMPSTAT'2010, pp.177-186, 2010.

J. Duchi, E. Hazan, and Y. Singer, Incremental Gradient, Subgradient, and Proximal Methods for Convex Optimization: A Survey, Optimization for Machine Learning, vol.12, pp.2121-2159, 2011.

M. D. Zeiler, Adadelta: An adaptive learning rate method, vol.12, p.2012

D. P. Kingma and J. Ba, Adam: A method for stochastic optimization, vol.12, p.2014

G. E. Hinton, S. Osindero, and Y. Teh, A Fast Learning Algorithm for Deep Belief Nets, Neural Computation, vol.18, issue.7, pp.1527-1554, 2006.

V. Nair and G. E. Hinton, Rectified linear units improve restricted boltzmann machines, Proceedings of the 27th International Conference on International Conference on Machine Learning, ICML'10, pp.807-814, 2010.

N. Srivastava, G. E. Hinton, A. Krizhevsky, I. Sutskever, and R. Salakhutdinov, Dropout: a simple way to prevent neural networks from overfitting, Journal of Machine Learning Research, vol.15, issue.1, pp.1929-1958, 2014.

F. Palenzuela, M. Shaffer, M. Ennis, J. Gorski, D. Mcgrew et al., Multilayer perceptron algorithms for cyberattack detection, 2016 IEEE National Aerospace and Electronics Conference (NAECON) and Ohio Innovation Summit (OIS), vol.7, p.2016, 2016.

N. Mowla, I. Doh, and K. Chae, Evolving neural network intrusion detection system for MCPS, 2017 19th International Conference on Advanced Communication Technology (ICACT), vol.2, p.2017, 2017.

. Maxime, Faivre, Maxime, for Léon Maxime, 2011.

S. Potluri and C. Diedrich, Accelerated deep neural networks for enhanced Intrusion Detection System, 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA), vol.9, p.2016, 2016.

Y. Bengio, P. Lamblin, D. Popovici, and H. Larochelle, Greedy Layer-Wise Training of Deep Networks, Advances in Neural Information Processing Systems 19, pp.153-160, 2007.

K. He, X. Zhang, S. Ren, and J. Sun, Delving Deep into Rectifiers: Surpassing Human-Level Performance on ImageNet Classification, 2015 IEEE International Conference on Computer Vision (ICCV), vol.2, p.2015, 2015.

J. Kim, N. Shin, S. Y. Jo, and S. H. Kim, Method of intrusion detection using deep neural network, IEEE International Conference on Big Data and Smart Computing (BigComp), vol.2, p.2017, 2017.

A. Krizhevsky, I. Sutskever, and G. E. Hinton, ImageNet classification with deep convolutional neural networks, Communications of the ACM, vol.60, issue.6, pp.84-90, 2017.

B. Ng and R. Abugharbieh, Generalized Sparse Regularization with Application to fMRI Brain Decoding, Lecture Notes in Computer Science, vol.72, pp.612-623, 2011.

Q. Niyaz, A. Javaid, W. Sun, and M. Alam, A deep learning approach for network intrusion detection system, vol.15, pp.21-26, 2016.

R. Raina, A. Battle, H. Lee, B. Packer, and A. Y. Ng, Self-taught learning, Proceedings of the 24th international conference on Machine learning - ICML '07, pp.759-766, 2007.

M. Yousefi-azar, V. Varadharajan, L. Hamey, and U. Tupakula, Autoencoder-based feature learning for cyber security applications, 2017 International Joint Conference on Neural Networks (IJCNN), vol.5, p.2017, 2017.

I. Goodfellow, Y. Bengio, and A. Courville, Deep Learning, 2016.

D. Erhan, Y. Bengio, A. Courville, P. Manzagol, P. Vincent et al., Why does unsupervised pre-training help deep learning?, Journal of Machine Learning Research, vol.11, pp.625-660, 2010.

K. Alrawashdeh and C. Purdy, Toward an Online Anomaly Intrusion Detection System Based on Deep Learning, 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA), vol.12, p.2016, 2016.

Y. Liu and X. Zhang, 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress, vol.8, p.2016, 2016.

M. Z. Alaya, S. Bussy, S. Gaïffas, and A. Guilloux, Binarsity: a penalization for one-hot encoded features, vol.3, p.2017
URL : https://hal.archives-ouvertes.fr/hal-01648382

, Ensemble-Average Representation of Pt Clusters in Conditions of Catalysis Accessed through GPU Accelerated Deep Neural Network Fitting Global Optimization

W. Schweizer, Kurzeinführung in Matlab und die Symbolic Math Toolbox, 2018.

Y. Bengio, P. Simard, and P. Frasconi, Learning long-term dependencies with gradient descent is difficult, IEEE Transactions on Neural Networks, vol.5, issue.2, pp.157-166, 1994.

R. C. Staudemeyer, Applying long short-term memory recurrent neural networks to intrusion detection, South African Computer Journal, vol.56, issue.1, pp.136-154, 2015.

J. Kim, J. Kim, H. L. Thi-thu, and H. Kim, Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection, 2016 International Conference on Platform Technology and Service (PlatCon), vol.2, p.2016, 2016.

T. T. Le, J. Kim, and H. Kim, An Effective Intrusion Detection Classifier Using Long Short-Term Memory with Gradient Descent Optimization, 2017 International Conference on Platform Technology and Service (PlatCon), vol.2, p.2017, 2017.

D. D.patil and P. Gupta, Growing Hierarchical Self-Organizing Map (GHSOM) for Mining Gene Expression Data, International Journal of Computer Applications, vol.109, issue.2, pp.16-17, 2015.

A. Rauber, D. Merkl, and M. Dittenbach, The growing hierarchical self-organizing map: exploratory analysis of high-dimensional data, IEEE Transactions on Neural Networks, vol.13, issue.6, pp.1331-1341, 2002.

T. Kiziloren and E. Germen, Anomaly Detection with Self-Organizing Maps and Effects of Principal Component Analysis on Feature Vectors, 2009 Fifth International Conference on Natural Computation, vol.2, pp.509-513, 2009.

S. Mcelwee and J. Cannady, Improving the performance of self-organizing maps for intrusion detection, SoutheastCon 2016, vol.3, pp.1-6, 2016.

V. D. Almendra, D. En?chescu, and C. En?chescu, Ranking computer science conferences using self-organizing maps with dynamic node splitting, Scientometrics, vol.102, issue.1, pp.267-283, 2014.

X. Cheng and S. Wen, A real-time hybrid intrusion detection system based on Principle Component Analysis and Self Organizing Maps, 2010 Sixth International Conference on Natural Computation, vol.3, pp.1182-1185, 2010.

D. Ippoliti and X. Zhou, An Adaptive Growing Hierarchical Self Organizing Map for Network Intrusion Detection, 2010 Proceedings of 19th International Conference on Computer Communications and Networks, pp.1-7, 2010.

M. Salem and U. Buehler, An Enhanced GHSOM for IDS, 2013 IEEE International Conference on Systems, Man, and Cybernetics, vol.10, p.2013, 2013.

P. Yichun, N. Yi, and H. Qiwei, Research on Intrusion Detection System Based on IRBF, 2012 Eighth International Conference on Computational Intelligence and Security, vol.11, p.2012, 2012.

M. Dorigo and M. Birattari, Ant Colony Optimization, Encyclopedia of Machine Learning and Data Mining, pp.56-59, 2017.

G. A. Carpenter, S. Grossberg, and D. B. Rosen, ART 2-A: An adaptive resonance algorithm for rapid category learning and recognition, Neural Networks, vol.4, issue.4, pp.493-504, 1991.

G. A. Carpenter, S. Grossberg, and D. B. Rosen, Fuzzy ART: Fast stable learning and categorization of analog patterns by an adaptive resonance system, Neural Networks, vol.4, issue.6, pp.759-771, 1991.

X. Han, An improved intrusion detection system based on neural network, IEEE International Conference on Intelligent Computing and Intelligent Systems, vol.1, pp.887-890, 2009.

N. Ngamwitthayanon, N. Wattanapongsakorn, and D. W. Coit, Investigation of Fuzzy Adaptive Resonance Theory in Network Anomaly Intrusion Detection, Advances in Neural Networks ? ISNN 2009, vol.9, pp.208-217, 2009.

P. Mell, V. Hu, R. Lippmann, J. Haines, and M. Zissman, An overview of issues in testing intrusion detection systems, 2003.

R. Werlinger, K. Hawkey, K. Muldner, P. Jaferian, and K. Beznosov, The challenges of using an intrusion detection system, Proceedings of the 4th symposium on Usable privacy and security - SOUPS '08, pp.107-118, 2008.

P. Chifflier and A. Fontaine, Architecture système sécurisée de sonde ids réseau, Journées C&ESAR 2014 : Détection et réaction face aux attaques informatiques, pp.97-109, 2014.

M. Z. Alaya, S. Bussy, S. Gaïffas, and A. Guilloux, Supervised Learning-Linear Regression, Python® Machine Learning, vol.20, pp.119-149, 2019.

J. Zhang and I. Mani, KNN Approach to Unbalanced Data Distributions: A Case Study Involving Information Extraction, Proceedings of the ICML'2003 Workshop on Learning from Imbalanced Datasets, 2003.

D. L. Wilson, Asymptotic Properties of Nearest Neighbor Rules Using Edited Data, IEEE Transactions on Systems, Man, and Cybernetics, vol.SMC-2, issue.3, pp.408-421, 1972.

I. Tomek, An Experiment with the Edited Nearest-Neighbor Rule, IEEE Transactions on Systems, Man, and Cybernetics, vol.SMC-6, issue.6, pp.448-452, 1976.

M. R. Smith, T. R. Martinez, and C. G. Giraud-carrier, An instance level analysis of data complexity, Machine Learning, vol.95, issue.2, pp.225-256, 2013.

N. V. Chawla, K. W. Bowyer, L. O. Hall, and W. P. Kegelmeyer, SMOTE: Synthetic Minority Over-sampling Technique, Journal of Artificial Intelligence Research, vol.16, pp.321-357, 2002.

H. He, Y. Bai, E. A. Garcia, and S. Li, Adasyn: Adaptive synthetic sampling approach for imbalanced learning, IN: IEEE INTERNATIONAL JOINT CON-FERENCE ON NEURAL NETWORKS (IEEE WORLD CONGRESS ON COM-PUTATIONAL INTELLIGENCE, pp.1322-1328, 2008.

I. Tomek, Two Modifications of CNN, IEEE Transactions on Systems, Man, and Cybernetics, vol.SMC-6, issue.11, pp.769-772, 1976.

G. Lemaître, F. Nogueira, and C. K. Aridas, Imbalanced-learn: A python toolbox to tackle the curse of imbalanced datasets in machine learning, J. Mach. Learn. Res, vol.18, pp.559-563, 2017.

M. Abadi, A. Agarwal, P. Barham, E. Brevdo, Z. Chen et al., Tensorflow: Large-scale machine learning on heterogeneous distributed systems, 2016.

F. Chollet, Keras

J. Bergstra, R. Bardenet, Y. Bengio, and B. Kégl, Algorithms for hyper-parameter optimization, Proceedings of the 24th International Conference on Neural Information Processing Systems, NIPS'11, pp.2546-2554, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00642998

J. Bergstra and Y. Bengio, Random search for hyper-parameter optimization, J. Mach. Learn. Res, vol.13, pp.281-305, 2012.

J. Bergstra, D. Yamins, and D. D. Cox, Hyperopt: A Python Library for Optimizing the Hyperparameters of Machine Learning Algorithms, Proceedings of the 12th Python in Science Conference, 2013.

T. G. Dietterich, Ensemble Methods in Machine Learning, Multiple Classifier Systems, pp.1-15, 2000.

B. A. Tama, A. S. Patil, and K. H. Rhee, An Improved Model of Anomaly Detection Using Two-Level Classifier Ensemble, 2017 12th Asia Joint Conference on Information Security (AsiaJCIS), p.2017, 2017.

N. T. Pham, E. Foo, S. Suriadi, H. Jeffrey, and H. F. Lahza, Improving performance of intrusion detection system using ensemble methods and feature selection, Proceedings of the Australasian Computer Science Week Multiconference on - ACSW '18, vol.01, pp.1-6, 2018.

N. K. Kanakarajan and K. Muniasamy, Improving the Accuracy of Intrusion Detection Using GAR-Forest with Feature Selection, Advances in Intelligent Systems and Computing, vol.10, pp.539-547, 2015.

M. S. Pervez and D. M. Farid, Feature selection and intrusion classification in NSL-KDD cup 99 dataset employing SVMs, The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014), vol.04, 2014.

S. Nembrini, I. R. König, and M. N. Wright, The revival of the Gini importance?, Bioinformatics, vol.34, issue.21, pp.3711-3718, 2018.

C. Tan, F. Sun, T. Kong, W. Zhang, C. Yang et al., A Survey on Deep Transfer Learning, Artificial Neural Networks and Machine Learning ? ICANN 2018, pp.270-279, 2018.

M. Ring, S. Wunderlich, D. Scheuring, D. Landes, and A. Hotho, A survey of network-based intrusion detection data sets, Computers & Security, vol.86, pp.147-167, 2019.

S. Zanero and S. M. Savaresi, Unsupervised learning techniques for an intrusion detection system, Proceedings of the 2004 ACM symposium on Applied computing - SAC '04, pp.412-419, 2004.

S. Amante, B. E. Carpenter, S. Jiang, and J. Rajahalme, IPv6 Flow Label Specification, 2011.

A. Radford, J. Wu, R. Child, D. Luan, D. Amodei et al., Phrase Structure and Functional Categories, The Handbook of Child Language, pp.483-507, 2019.

G. Gu, P. Fogla, D. Dagon, W. Lee, and B. Skori?, Measuring intrusion detection capability, Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS '06, pp.90-101, 2006.

M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, A detailed analysis of the KDD CUP 99 data set, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp.1-6, 2009.

K. Leung and C. Leckie, Unsupervised anomaly detection in network intrusion detection using clusters, pp.333-342, 2005.

G. Kotani and Y. Sekiya, Unsupervised Scanning Behavior Detection Based on Distribution of Network Traffic Features Using Robust Autoencoders, 2018 IEEE International Conference on Data Mining Workshops (ICDMW), pp.35-38, 2018.

A. H. Mirza and S. Cosan, Computer network intrusion detection using sequential LSTM Neural Networks autoencoders, 2018 26th Signal Processing and Communications Applications Conference (SIU), pp.1-4, 2018.

I. Sharafaldin, A. Habibi-lashkari, and A. A. Ghorbani, Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization, Proceedings of the 4th International Conference on Information Systems Security and Privacy, vol.01, pp.108-116, 2018.

N. Z. Bawany, J. A. Shamsi, and K. Salah, DDoS Attack Detection and Mitigation Using SDN: Methods, Practices, and Solutions, Arabian Journal for Science and Engineering, vol.42, issue.2, pp.425-441, 2017.

J. D. Case, M. Fedor, M. L. Schoffstall, and J. Davin, Simple Network Management Protocol (SNMP), 1990.

R. Sommer and A. Feldmann, NetFlow, Proceedings of the second ACM SIGCOMM Workshop on Internet measurment - IMW '02, pp.173-174, 2002.

P. Phaal, S. Panchen, and N. Mckee, InMon Corporation's sFlow: A Method for Monitoring Traffic in Switched and Routed Networks, 2001.

C. So-in, A survey of network traffic monitoring and analysis tools, p.24, 2006.

M. , eLS, pp.7-53, 2001.

M. Devare and A. Kumar, Conclusion, Chapman & Hall/CRC Computer Science & Data Analysis, vol.7, pp.241-246, 2005.

P. Singhal and A. Yadav, Congestion detection in Wireless sensor network using neural network, International Conference for Convergence for Technology-2014, pp.1-4, 2014.

T. Issariyakul and E. Hossain, Introduction to Network Simulator 2 (NS2), Introduction to Network Simulator NS2, pp.1-18, 2008.

J. B. Madalgi and S. A. Kumar, Congestion detection in wireless sensor networks using MLP and classification by regression, 2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), pp.226-231, 2017.

J. B. Madalgi and S. Anupama-kumar, Development of Wireless Sensor Network Congestion Detection Classifier Using Support Vector Machine, 2018 3rd International Conference on Computational Systems and Information Technology for Sustainable Solutions (CSITSS), pp.187-192, 2018.

N. Zhang, F. Jaafar, and Y. Malik, Low-Rate DoS Attack Detection Using PSD Based Entropy and Machine Learning, 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), pp.59-62, 2019.

P. H. Silva and N. Alves, IPERF tool: generation and evaluation of TCP and UDP data traffic, Notas técnicas, vol.4, issue.2, pp.1-13, 2014.

C. Schmoll and S. Zander, Netmate-user and developer manual

Y. Bengio and Y. Grandvalet, Bias in Estimating the Variance of K-Fold Cross-Validation, Statistical Modeling and Analysis for Complex Data Problems, vol.5, pp.75-95

S. Hochreiter and J. Schmidhuber, Long Short-Term Memory, Neural Computation, vol.9, issue.8, pp.1735-1780, 1997.

B. Pfaff, J. Pettit, T. Koponen, E. J. Jackson, A. Zhou et al., Proceedings of the second USENIX symposium on Operating systems design and implementation - OSDI '96, Proceedings of the 12th USENIX Conference on Networked Systems Design and Implementation, NSDI'15, pp.117-130, 1996.