P. Abry, P. Flandrin, M. S. Taqqu, and D. Veitch, Wavelets for the analysis, estimation and synthesis of scaling data, Self-Similar Network Traffic and Performance Evaluation, 2000.

P. Abry and D. Veitch, Wavelet analysis of long-range dependent traffic, IEEE Trans. on Info. Theory, vol.44, issue.1, pp.2-15, 1998.

A. Andersen and B. Nielsen, A Markovian approach for modelling packet traffic with long range dependence, IEEE journal on Selected Areas in Communications, vol.5, issue.16, pp.719-732, 1998.

C. Barakat, P. Thiran, G. Iannaccone, C. Diot, and P. Owezarski, A flow-based model for internet backbone traffic, ACM/SIGCOMM Internet Measurement Workshop, pp.35-47, 2002.

P. Barford, J. Kline, D. Plonka, and A. Ron, A signal analysis of network traffic anomalies, ACM/SIGCOMM Internet Measurement Workshop, 2002.

M. Basseville, Distance measures for signal processing and pattern recognition, Signal Processing, vol.18, pp.349-369, 1989.
URL : https://hal.archives-ouvertes.fr/inria-00075657

J. Beran, Statistics for Long-memory processes, 1994.

J. Brutlag, Aberrant behavior detection in time series for network monitoring, USENIX System Administration Conference, 2000.

C. Cheng, H. T. Kung, and K. Tan, Use of spectral analysis in defense against DoS attacks, IEEE Globecom, 2002.

J. Cleary, S. Donnelly, I. Graham, A. Mcgregor, and M. Pearson, Design principles for accurate passive measurement, Passive and Active Measurements, 2000.

N. Desaulniers-soucy and A. Iuoras, Traffic modeling with universal multifractals, IEEE Globecom, 1999.

P. Doukhan, G. Oppenheim, and M. S. Taqqu, Long-Range Dependence: Theory and Applications, 2003.

A. Erramilli, O. Narayan, and W. Willinger, Experimental queueing analysis with long-range dependent packet traffic, ACM/IEEE transactions on Networking, vol.4, pp.209-223, 1996.

M. Evans, N. Hastings, and B. Peacock, Statistical Distributions. Wiley (Interscience Division), 2000.

A. Feldmann, A. C. Gilbert, and W. Willinger, Data networks as cascades: Investigating the multifractal nature of internet wan traffic, ACM/SIGCOMM conference on Applications, technologies, architectures, and protocols for computer communication, 1998.

G. J. Hahn and S. S. Shapiro, Statistical Models in Engineering, Interscience Division), p.88, 1994.

J. Hochberg, K. Jackson, C. Stallings, J. F. Mcclary, D. Dubois et al., NADIR: an automated system for detecting network intrusion and misuse, Journal of Computer Secururity, vol.12, issue.3, pp.235-248, 1993.

N. Hohn, D. Veitch, and P. Abry, Cluster processes, a natural language for network traffic, IEEE Transactions on Signal Processing Special Issue on Signal Processing in Networking, vol.8, issue.51, pp.2229-2244, 2003.

N. Hohn, D. Veitch, and P. Abry, Multifractality in tcp/ip traffic: the case against, Computer Networks Journal, 2005.

A. Hussain, J. Heidemann, and C. Papadopoulos, A framework for classifying denial of service attacks, SIGCOMM, 2003.

V. Javits, The SRI IDES statistical anomaly detector. ESORICS, 1991.

S. Jin and D. Yeung, A covariance analysis model for DDoS attack detection, IEEE International Conference on Communications, 2004.

J. Jung, B. Krishnamurthy, and M. Rabinovich, Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites, International WWW Conference, 2002.

T. Karagiannis, M. Molle, M. Faloutsos, and A. Broido, A non stationary Poisson view of the internet traffic, INFOCOMM, 2004.

A. Lakhina, M. Crovella, and C. Diot, Diagnosing network-wide traffic anomalies, SIGCOMM, 2004.

W. E. Leland, M. S. Taqqu, W. Willinger, and D. V. Wilson, On the self-similar nature of ethernet traffic, ACM/IEEE transactions on Networking, vol.2, pp.1-15, 1994.

L. Li and G. Lee, DDoS attack detection and wavelets, International Conference on computer communications and networks, 2003.

L. Ljung, System identification: theory for the user, chapter 10.2. PTR Prentice Hall, 1999.

S. B. Lowen, S. S. Cash, M. Poo, and M. C. Teich, Quantal neurotransmitter secretion rate exhibits fractal behavior, The journal of Neuroscience, vol.17, issue.15, pp.5666-5677, 1997.

S. Mallat, A Wavelet tour of signal processing, 1999.

B. Melamed, An overview of TES processes and modeling methodology, Performance/SIGMETRICS Tutorials, pp.359-393, 1993.

D. Moore, G. M. Voelker, and S. Savage, Inferring internet denial-of-service activity, Usenix Security Symposium, 2001.

I. Norros, On the use of fractional Brownian motion in the theory of connectionless networks, IEEE journal on Selected Areas in Communications, vol.13, issue.6, 1995.

K. Park, G. Kim, and M. Crovella, On the relationship between file sizes, transport protocols, and self-similar network traffic, International Conference on Network Protocols, p.171, 1996.

K. Park and W. Willinger, Self-similar network traffic: An overview, Self-Similar Network Traffic and Performance Evaluation, pp.1-38, 2000.

S. Paulo, V. Rui, and P. António, Multiscale fitting procedure using Markov Modulated Poisson Processes, Telecommunication Systems, vol.23, issue.1, pp.123-148, 2003.

V. Paxon and S. Floyd, Wide-area traffic: The failure of Poisson modeling, ACM/IEEE transactions on Networking, vol.3, issue.3, pp.226-244, 1995.

V. Paxson, Bro: a system for detecting network intruders in real-time, Computer Networks Journal, vol.31, pp.2435-2463, 1999.

, QoSMOS Traffic Designer

G. Samorodnitsky and M. Taqqu, Stable Non-Gaussian Random Processes. Chapman&Hall, 1994.

S. Sarvotham, R. Riedi, and R. Baraniuk, Connection-level analysis and modeling of network traffic, 2001.

M. Taqqu, V. Teverosky, and W. Willinger, Is network traffic self-similar or multifractal ?, Fractals, vol.5, issue.1, pp.63-73, 1997.

B. Tsybakov and N. D. Georganas, Self similar processes in communications networks, IEEE Trans. on Info. Theory, vol.44, issue.5, pp.1713-1725, 1998.

S. Uhlig, O. Bonaventure, and C. Rapier, 3D-LD: a graphical wavelet-based method for analyzing scaling processes, ITC Specialist Seminar, pp.329-336, 2003.

H. S. Vaccaro and G. E. Liepins, Detection of anomalous computer session activity, IEEE Symposium on Security and Privacy, pp.280-289, 1989.

J. , L. Véhel, and R. H. Riedi, Brownian motion and data traffic modeling: The other end of the spectrum, Fractals in Engineering'97, 1997.

D. Veitch and P. Abry, A wavelet based joint estimator of the parameters of long-range dependence, IEEE Trans. on Info. Theory special issue on, vol.45, issue.3, pp.878-897, 1999.

D. Veitch and P. Abry, A statistical test for the time constancy of scaling exponents, IEEE Transactions on Signal Processing, vol.49, issue.10, pp.2325-2334, 2001.

D. Veitch, P. Abry, and M. S. Taqqu, On the automatic selection of the onset of scaling, Fractals, vol.11, issue.4, pp.377-390, 2003.

N. Ye, A Markov chain model of temporal behavior for anomaly detection, Workshop on Information Assurance and Security, 2000.

J. Yuan and K. Mills, DDoS attack detection and wavelets, 2004.

Z. Zhang, V. Ribeiro, S. Moon, and C. Diot, Small time scaling behavior of internet backbone traffic: an emprirical study. INFOCOMM, 2003.