Wavelets for the analysis, estimation and synthesis of scaling data, Self-Similar Network Traffic and Performance Evaluation, 2000. ,
Wavelet analysis of long-range dependent traffic, IEEE Trans. on Info. Theory, vol.44, issue.1, pp.2-15, 1998. ,
A Markovian approach for modelling packet traffic with long range dependence, IEEE journal on Selected Areas in Communications, vol.5, issue.16, pp.719-732, 1998. ,
A flow-based model for internet backbone traffic, ACM/SIGCOMM Internet Measurement Workshop, pp.35-47, 2002. ,
A signal analysis of network traffic anomalies, ACM/SIGCOMM Internet Measurement Workshop, 2002. ,
Distance measures for signal processing and pattern recognition, Signal Processing, vol.18, pp.349-369, 1989. ,
URL : https://hal.archives-ouvertes.fr/inria-00075657
Statistics for Long-memory processes, 1994. ,
Aberrant behavior detection in time series for network monitoring, USENIX System Administration Conference, 2000. ,
Use of spectral analysis in defense against DoS attacks, IEEE Globecom, 2002. ,
Design principles for accurate passive measurement, Passive and Active Measurements, 2000. ,
Traffic modeling with universal multifractals, IEEE Globecom, 1999. ,
Long-Range Dependence: Theory and Applications, 2003. ,
Experimental queueing analysis with long-range dependent packet traffic, ACM/IEEE transactions on Networking, vol.4, pp.209-223, 1996. ,
, Statistical Distributions. Wiley (Interscience Division), 2000.
Data networks as cascades: Investigating the multifractal nature of internet wan traffic, ACM/SIGCOMM conference on Applications, technologies, architectures, and protocols for computer communication, 1998. ,
Statistical Models in Engineering, Interscience Division), p.88, 1994. ,
NADIR: an automated system for detecting network intrusion and misuse, Journal of Computer Secururity, vol.12, issue.3, pp.235-248, 1993. ,
Cluster processes, a natural language for network traffic, IEEE Transactions on Signal Processing Special Issue on Signal Processing in Networking, vol.8, issue.51, pp.2229-2244, 2003. ,
Multifractality in tcp/ip traffic: the case against, Computer Networks Journal, 2005. ,
A framework for classifying denial of service attacks, SIGCOMM, 2003. ,
, The SRI IDES statistical anomaly detector. ESORICS, 1991.
A covariance analysis model for DDoS attack detection, IEEE International Conference on Communications, 2004. ,
Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites, International WWW Conference, 2002. ,
A non stationary Poisson view of the internet traffic, INFOCOMM, 2004. ,
Diagnosing network-wide traffic anomalies, SIGCOMM, 2004. ,
On the self-similar nature of ethernet traffic, ACM/IEEE transactions on Networking, vol.2, pp.1-15, 1994. ,
DDoS attack detection and wavelets, International Conference on computer communications and networks, 2003. ,
System identification: theory for the user, chapter 10.2. PTR Prentice Hall, 1999. ,
Quantal neurotransmitter secretion rate exhibits fractal behavior, The journal of Neuroscience, vol.17, issue.15, pp.5666-5677, 1997. ,
A Wavelet tour of signal processing, 1999. ,
An overview of TES processes and modeling methodology, Performance/SIGMETRICS Tutorials, pp.359-393, 1993. ,
Inferring internet denial-of-service activity, Usenix Security Symposium, 2001. ,
On the use of fractional Brownian motion in the theory of connectionless networks, IEEE journal on Selected Areas in Communications, vol.13, issue.6, 1995. ,
On the relationship between file sizes, transport protocols, and self-similar network traffic, International Conference on Network Protocols, p.171, 1996. ,
Self-similar network traffic: An overview, Self-Similar Network Traffic and Performance Evaluation, pp.1-38, 2000. ,
Multiscale fitting procedure using Markov Modulated Poisson Processes, Telecommunication Systems, vol.23, issue.1, pp.123-148, 2003. ,
Wide-area traffic: The failure of Poisson modeling, ACM/IEEE transactions on Networking, vol.3, issue.3, pp.226-244, 1995. ,
Bro: a system for detecting network intruders in real-time, Computer Networks Journal, vol.31, pp.2435-2463, 1999. ,
, QoSMOS Traffic Designer
, Stable Non-Gaussian Random Processes. Chapman&Hall, 1994.
Connection-level analysis and modeling of network traffic, 2001. ,
Is network traffic self-similar or multifractal ?, Fractals, vol.5, issue.1, pp.63-73, 1997. ,
Self similar processes in communications networks, IEEE Trans. on Info. Theory, vol.44, issue.5, pp.1713-1725, 1998. ,
3D-LD: a graphical wavelet-based method for analyzing scaling processes, ITC Specialist Seminar, pp.329-336, 2003. ,
Detection of anomalous computer session activity, IEEE Symposium on Security and Privacy, pp.280-289, 1989. ,
Brownian motion and data traffic modeling: The other end of the spectrum, Fractals in Engineering'97, 1997. ,
A wavelet based joint estimator of the parameters of long-range dependence, IEEE Trans. on Info. Theory special issue on, vol.45, issue.3, pp.878-897, 1999. ,
A statistical test for the time constancy of scaling exponents, IEEE Transactions on Signal Processing, vol.49, issue.10, pp.2325-2334, 2001. ,
On the automatic selection of the onset of scaling, Fractals, vol.11, issue.4, pp.377-390, 2003. ,
A Markov chain model of temporal behavior for anomaly detection, Workshop on Information Assurance and Security, 2000. ,
DDoS attack detection and wavelets, 2004. ,
Small time scaling behavior of internet backbone traffic: an emprirical study. INFOCOMM, 2003. ,