Z. Su and G. Wassermann, The essence of command injection attacks in web applications, ACM SIGPLAN Notices, vol.41, issue.1, pp.372-382, 2006.
DOI : 10.1145/1111320.1111070

C. Wang, An experimental study on firewall performance : Dive into the bottleneck for firewall effectiveness, Information Assurance and Security (IAS), 2014 10th International Conference on, pp.71-76

A. V. Aho and M. Corasick, Efficient string matching: an aid to bibliographic search, Communications of the ACM, vol.18, issue.6, pp.333-340
DOI : 10.1145/360825.360855

R. S. Boyer and J. S. Moore, A fast string searching algorithm, Communications of the ACM, vol.20, issue.10, pp.262-272, 1977.
DOI : 10.1145/359842.359859

T. Berners-lee, A Unifying Syntax for the Expression of Names and Addresses of Objects on the Network as used in the World-Wide Web, p.1630, 1994.

J. W. Haines, D. J. Fried, J. Korba, K. Das, and M. , Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation Richard Lippmann, pp.2173-9108

P. Kabiri and A. Ghorbani, Research in intrusion detection and response a survey, International Journal of Network Security, vol.1, issue.2, pp.84-102, 2005.

T. Sobh, Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art, Computer Standards & Interfaces, vol.28, issue.6, pp.670-94, 2006.
DOI : 10.1016/j.csi.2005.07.002

E. Denning, An intrusion-detection model, IEEE Transactions on Software Engineering, vol.13, issue.2, pp.222-254, 1987.

S. Staniford-chen, B. Tung, P. Porrar, C. Kahn, D. Schnackenberg et al., The common intrusion detection frameworkdata formats, 1998.

J. Esteâ´vez-tapiador, P. Garca-teodoro, and J. Daz-verdejo, Anomaly detection methods in wired networks : a survey and taxonomy, Computer Networks, vol.27, issue.16, pp.1569-84, 2004.

A. Lazarevic, V. Kumar, and J. Srivastava, Intrusion detection : a survey, Managing cyber threats : issues, approaches, and challenges, p.330, 2005.

D. Denning and P. Neumann, Requirements and model for IDES ? a real-time intrusion detection system, 1985.

N. Ye, S. Emran, Q. Chen, and S. Vilbert, Multivariate statistical analysis of audit trails for host-based intrusion detection, IEEE Transactions on Computers, vol.51, issue.7, 2002.
DOI : 10.1109/TC.2002.1017701

D. Anderson, T. Lunt, H. Javitz, T. U. , A. Valdes et al., Detecting unusual program behaviour using the statistical component of the next-g eneration intrusion detection expert system (NIDES), 1995.

J. Esteavez-tapiador, P. Garcaa-teodoro, and J. Daaz-verdejo, Stochastic protocol modeling for anomaly based network intrusion detection, First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003. Proceedings., pp.3-12, 2003.
DOI : 10.1109/IWIAS.2003.1192454

R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, A. Tiwari et al., Specificationbased anomaly detection : a new approach for detecting network intrusions, Proceedings of the Ninth ACM Conference on Computer and Communications Security, pp.265-74, 2002.
DOI : 10.1145/586110.586146

D. Heckerman, A tutorial on learning with Bayesian networks Microsoft Research, 1995.

C. Kruegel, D. Mutz, W. Robertson, and F. Valeur, Bayesian event classification for intrusion detection, 19th Annual Computer Security Applications Conference, 2003. Proceedings., 2003.
DOI : 10.1109/CSAC.2003.1254306

URL : http://www.cs.ucsb.edu/~wkr/publications/acsac03bayes.pdf

D. Yeung and Y. Ding, Host-based intrusion detection using dynamic and static behavioral models, Pattern Recognition, vol.36, issue.1, pp.229-272, 2003.
DOI : 10.1016/S0031-3203(02)00026-2

M. V. Mahoney and P. K. Chan, Learning non stationary models of normal network traffic for detecting novel attacks, Proceed ings of the Eighth ACM SIGKDD, pp.376-85, 2002.

J. M. Esteaez-tapiador, P. Garca-teodoro, and J. E. Daz-verdejo, Detection of web-based attacks through Markovian protocol parsing, Proc. ISCC05 ; 2005 p, pp.457-62

K. Fox, R. Henning, J. Reed, and R. Simonian, A neural network approach towards intrusion detection, 13th National Computer Security Conference, pp.125-159, 1990.

H. Debar, M. Becker, and D. Siboni, A neural network component for an intrusion detection system, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pp.240-50, 1992.
DOI : 10.1109/RISP.1992.213257

A. M. Cansian, E. Moreira, A. Carvalho, and J. M. Bonifacio, Network intrusion detection using neural networks, International Conference on Computational Intelligence and Multimedia Applications (ICCMA ?97), pp.276-80, 1997.

M. Ramadas, S. Ostermann, and B. Tjaden, Detecting anomalous network traffic with selforganizing maps In : Recent advances in intrusion detection, RAID. Lecture notes in computer science, LNCS), vol.2820, pp.36-54, 2003.

R. Quinlan, Induction of decision trees, Machine Learning, vol.1, issue.1, pp.81-106, 1986.
DOI : 10.1037/13135-000

R. Quinlan and C. , 5 : Programs for Machine Learning, 1993.

C. Kruegel and T. Toth, Using decision trees to improve signaturebasedintrusion detection, Proc. 6th Int. Workshop Recent Adv.Intrusion Detect, pp.173-191, 2003.
DOI : 10.1007/978-3-540-45248-5_10

URL : http://www.infosys.tuwien.ac.at/Staff/chris/./doc/2003_03.ps

V. Vapnik, The Nature of Statistical Learning Theory, 2010.

A. L. Buczak and E. Guven, A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection, IEEE Communications Surveys & Tutorials, vol.18, issue.2, pp.1153-1176, 2015.
DOI : 10.1109/COMST.2015.2494502

W. J. Hu, Y. H. Liao, and V. R. Vemuri, Robust support vector machines for anomaly detection in computer security, Proc. 20th Int. Conf, pp.282-289, 2003.

R. Lippmann, J. Haines, D. Fried, J. Korba, and K. Das, The 1999 DARPA off-line intrusion detection evaluation, Computer Networks, vol.34, issue.4, pp.579-595, 2000.
DOI : 10.1016/S1389-1286(00)00139-0

S. M. Bridges and R. B. Vaughn, Fuzzy data mining and genetic algorithms applied to intrusion detection, Proceedings of the National Information Systems Security Conference, pp.13-31, 2000.

J. E. Dickerson, Fuzzy network profiling for intrusion detection, PeachFuzz 2000. 19th International Conference of the North American Fuzzy Information Processing Society, NAFIPS (Cat. No.00TH8500), pp.301-307, 2000.
DOI : 10.1109/NAFIPS.2000.877441

URL : http://home.eng.iastate.edu/~julied/publications/NAFIPSpaper2000.pdf

W. Li, Using genetic algorithm for network intrusion detection, C.S.G. Department of Energy, pp.1-8, 2004.

L. Portnoy, E. Eskin, and S. J. Stolfo, Intrusion detection with unlabeleddata using clustering, Proceedings of The ACM Workshopon Data Mining Applied to Security, 2001.

K. Sequeira and M. Zaki, ADMIT, Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '02, pp.386-95, 2002.
DOI : 10.1145/775047.775103

Y. Liao and V. Vemuri, Use of K-Nearest Neighbor classifier for intrusion detection, Computers & Security, vol.21, issue.5, pp.439-487, 2002.
DOI : 10.1016/S0167-4048(02)00514-X

M. Breunig, H. P. Kriegel, R. T. Ng, and J. Sander, LOF : identifying density-based local outliers, Proceedings of the ACM SIGMOD, International Conference on Management of Data, pp.93-104, 2000.
DOI : 10.1007/978-3-540-48247-5_28

URL : http://www.cs.ualberta.ca/~joerg/papers/PKDD99-Outlier-final.pdf

I. D. Bro, Homepage, 2008.

Y. U. Ryu and H. S. Rhee, Evaluation of Intrusion Detection Systems Under a Resource Constraint, ACM Transactions on Information and System Security, vol.11, issue.4, p.20, 2008.
DOI : 10.1145/1380564.1380566

K. Wang, J. J. Parekh, and S. J. Stolfo, Anagram: A Content Anomaly Detector Resistant to Mimicry Attack, International Workshop on Recent Advances in Intrusion Detection, pp.226-248, 2006.
DOI : 10.1007/11856214_12

URL : http://packetstormsecurity.nl/papers/IDS/nids/Anagram.pdf

S. Axelsson, The base-rate fallacy and the difficulty of intrusion detection, ACM Transactions on Information and System Security, vol.3, issue.3, pp.186-205, 2000.
DOI : 10.1145/357830.357849

C. Kruegel, F. Valeur, G. Vigna, and R. Kemmerer, Statetul intrusion detection for highspeed networks, IEEE Symposium on Security and Privacy, pp.285-94, 2002.

S. Stolfo and W. Fan, Cost-based modeling for fraud and intrusion detection : results from the JAM project. DARPA Information Survivability Conference Exposition, pp.130-174, 2000.

J. Gaffney and J. Ulvila, Evaluation of intrusion detectors: a decision theory approach, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, pp.50-61, 2001.
DOI : 10.1109/SECPRI.2001.924287

P. Mell, V. Hu, R. Lippman, J. Zissm-an, and M. , An overview o issues in testing intrusion detection systems ?, 2003.
DOI : 10.6028/NIST.IR.7007

H. Debar, M. Dacier, A. Wespi, and S. Lampart, An experimentation workbench for intrusion detection systems, 1998.

N. Athanasiad-es, R. Abler, J. Levine, H. Owen, and G. Riley, Intrusion detection testing and benchmarking methodologies, Proceedings of the 1st IEEE inter national worksh op on information assurance, pp.63-72, 2003.

N. Puketza, K. Zhang, M. Chung, B. Mukherjee, and R. Olsson, A methodology for testing intrusion detection systems, IEEE Transactions on Software Engineering, vol.22, issue.10, pp.43-51, 1997.
DOI : 10.1109/32.544350

URL : http://www.cs.purdue.edu/homes/clay/papers/intrusion-detection/A_Methedology_for_Testing_Intrusion_Detection_Systems.ps

R. Lippmann, J. Haines, D. Fried, J. Korba, and K. Das, The 1999 DARPA off-line intrusion detection evaluation, Computer Networks, vol.34, issue.4, pp.579-95, 2000.
DOI : 10.1016/S1389-1286(00)00139-0

L. Rossey, J. Rabek, R. Cunnigham, R. Fried, R. Lippmann et al., LARIAT : Lincoln adaptable real-time information assurance test-bed. RAID, 2001.
DOI : 10.1109/aero.2002.1036158

URL : http://www.ll.mit.edu/IST/pubs/2001-rossey-IEEE_aeroconf.pdf

J. Mchugh, The 1998 Lincoln lab oratory IDS eval uation. A critique, RAID . LNCS, pp.145-151, 1907.

M. Mahoney and P. K. Chan, An analysis of the 1999 DARPA/Linco ln laboratory evaluation data for network anomaly detection. Florida tech, 2003.

J. Fan, J. Xu, M. Ammar, and S. Moon, Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme, Computer Networks, vol.46, issue.2, pp.253-72, 2004.
DOI : 10.1016/j.comnet.2004.03.033

M. Bermuadez-edo, R. Salazar-hernandez, J. E. Daz-verdejo, and P. Garca-teodoro, Proposals on Assessment Environments for Anomaly-Based Network Intrusion Detection Systems, LNCS, vol.4347, pp.210-231, 2006.
DOI : 10.1007/11962977_17

T. M. Cover and J. A. Thomas, Elements of information theory, 1991.

C. P. Robert, Le choix Baysien. Principes et pratiques, 2006.

I. Androutsopoulos, J. Koutsias, K. V. Chandrinos, G. Paliouras, and C. D. Spyropoulos, An Evaluation of Naive Bayesian Anti-Spam Filtering, Proceedings of the Workshop on Machine Learning in the New Information Age, 11th European Conference on Machine Learning, pp.9-17, 2000.

P. Mell, V. Hu, R. Lippman, J. Zissm-an, and M. , An overview o issues in testing intrusion detection systems ?, 2003.
DOI : 10.6028/NIST.IR.7007

URL : http://csrc.nist.gov/publications/nistir/nistir-7007.pdf

U. Fayyad, G. Piatetsky-shapiro, and P. Smyth, The KDD process for extracting useful knowledge from volumes of data, Communications of the ACM, vol.39, issue.11, pp.27-34, 1996.
DOI : 10.1145/240455.240464

H. Chouaib, Sélection de caractéristiques : méthodes et applications (Doctoral dissertation, 2011.

M. Dash and H. Liu, Feature selection for classification, Intelligent Data Analysis, vol.1, issue.1-4, pp.131-156, 1997.
DOI : 10.1016/S1088-467X(97)00008-5

H. Liu and L. Et-yu, Toward integrating feature selection algorithms for classification and clustering, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, vol.17, pp.491-502, 2005.

M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann et al., The WEKA data mining software, ACM SIGKDD Explorations Newsletter, vol.11, issue.1, pp.10-18, 2009.
DOI : 10.1145/1656274.1656278