The essence of command injection attacks in web applications, ACM SIGPLAN Notices, vol.41, issue.1, pp.372-382, 2006. ,
DOI : 10.1145/1111320.1111070
An experimental study on firewall performance : Dive into the bottleneck for firewall effectiveness, Information Assurance and Security (IAS), 2014 10th International Conference on, pp.71-76 ,
Efficient string matching: an aid to bibliographic search, Communications of the ACM, vol.18, issue.6, pp.333-340 ,
DOI : 10.1145/360825.360855
A fast string searching algorithm, Communications of the ACM, vol.20, issue.10, pp.262-272, 1977. ,
DOI : 10.1145/359842.359859
A Unifying Syntax for the Expression of Names and Addresses of Objects on the Network as used in the World-Wide Web, p.1630, 1994. ,
Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation Richard Lippmann, pp.2173-9108 ,
Research in intrusion detection and response a survey, International Journal of Network Security, vol.1, issue.2, pp.84-102, 2005. ,
Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art, Computer Standards & Interfaces, vol.28, issue.6, pp.670-94, 2006. ,
DOI : 10.1016/j.csi.2005.07.002
An intrusion-detection model, IEEE Transactions on Software Engineering, vol.13, issue.2, pp.222-254, 1987. ,
The common intrusion detection frameworkdata formats, 1998. ,
Anomaly detection methods in wired networks : a survey and taxonomy, Computer Networks, vol.27, issue.16, pp.1569-84, 2004. ,
Intrusion detection : a survey, Managing cyber threats : issues, approaches, and challenges, p.330, 2005. ,
Requirements and model for IDES ? a real-time intrusion detection system, 1985. ,
Multivariate statistical analysis of audit trails for host-based intrusion detection, IEEE Transactions on Computers, vol.51, issue.7, 2002. ,
DOI : 10.1109/TC.2002.1017701
Detecting unusual program behaviour using the statistical component of the next-g eneration intrusion detection expert system (NIDES), 1995. ,
Stochastic protocol modeling for anomaly based network intrusion detection, First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003. Proceedings., pp.3-12, 2003. ,
DOI : 10.1109/IWIAS.2003.1192454
Specificationbased anomaly detection : a new approach for detecting network intrusions, Proceedings of the Ninth ACM Conference on Computer and Communications Security, pp.265-74, 2002. ,
DOI : 10.1145/586110.586146
A tutorial on learning with Bayesian networks Microsoft Research, 1995. ,
Bayesian event classification for intrusion detection, 19th Annual Computer Security Applications Conference, 2003. Proceedings., 2003. ,
DOI : 10.1109/CSAC.2003.1254306
URL : http://www.cs.ucsb.edu/~wkr/publications/acsac03bayes.pdf
Host-based intrusion detection using dynamic and static behavioral models, Pattern Recognition, vol.36, issue.1, pp.229-272, 2003. ,
DOI : 10.1016/S0031-3203(02)00026-2
Learning non stationary models of normal network traffic for detecting novel attacks, Proceed ings of the Eighth ACM SIGKDD, pp.376-85, 2002. ,
Detection of web-based attacks through Markovian protocol parsing, Proc. ISCC05 ; 2005 p, pp.457-62 ,
A neural network approach towards intrusion detection, 13th National Computer Security Conference, pp.125-159, 1990. ,
A neural network component for an intrusion detection system, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pp.240-50, 1992. ,
DOI : 10.1109/RISP.1992.213257
Network intrusion detection using neural networks, International Conference on Computational Intelligence and Multimedia Applications (ICCMA ?97), pp.276-80, 1997. ,
Detecting anomalous network traffic with selforganizing maps In : Recent advances in intrusion detection, RAID. Lecture notes in computer science, LNCS), vol.2820, pp.36-54, 2003. ,
Induction of decision trees, Machine Learning, vol.1, issue.1, pp.81-106, 1986. ,
DOI : 10.1037/13135-000
5 : Programs for Machine Learning, 1993. ,
Using decision trees to improve signaturebasedintrusion detection, Proc. 6th Int. Workshop Recent Adv.Intrusion Detect, pp.173-191, 2003. ,
DOI : 10.1007/978-3-540-45248-5_10
URL : http://www.infosys.tuwien.ac.at/Staff/chris/./doc/2003_03.ps
The Nature of Statistical Learning Theory, 2010. ,
A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection, IEEE Communications Surveys & Tutorials, vol.18, issue.2, pp.1153-1176, 2015. ,
DOI : 10.1109/COMST.2015.2494502
Robust support vector machines for anomaly detection in computer security, Proc. 20th Int. Conf, pp.282-289, 2003. ,
The 1999 DARPA off-line intrusion detection evaluation, Computer Networks, vol.34, issue.4, pp.579-595, 2000. ,
DOI : 10.1016/S1389-1286(00)00139-0
Fuzzy data mining and genetic algorithms applied to intrusion detection, Proceedings of the National Information Systems Security Conference, pp.13-31, 2000. ,
Fuzzy network profiling for intrusion detection, PeachFuzz 2000. 19th International Conference of the North American Fuzzy Information Processing Society, NAFIPS (Cat. No.00TH8500), pp.301-307, 2000. ,
DOI : 10.1109/NAFIPS.2000.877441
URL : http://home.eng.iastate.edu/~julied/publications/NAFIPSpaper2000.pdf
Using genetic algorithm for network intrusion detection, C.S.G. Department of Energy, pp.1-8, 2004. ,
Intrusion detection with unlabeleddata using clustering, Proceedings of The ACM Workshopon Data Mining Applied to Security, 2001. ,
ADMIT, Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '02, pp.386-95, 2002. ,
DOI : 10.1145/775047.775103
Use of K-Nearest Neighbor classifier for intrusion detection, Computers & Security, vol.21, issue.5, pp.439-487, 2002. ,
DOI : 10.1016/S0167-4048(02)00514-X
LOF : identifying density-based local outliers, Proceedings of the ACM SIGMOD, International Conference on Management of Data, pp.93-104, 2000. ,
DOI : 10.1007/978-3-540-48247-5_28
URL : http://www.cs.ualberta.ca/~joerg/papers/PKDD99-Outlier-final.pdf
Homepage, 2008. ,
Evaluation of Intrusion Detection Systems Under a Resource Constraint, ACM Transactions on Information and System Security, vol.11, issue.4, p.20, 2008. ,
DOI : 10.1145/1380564.1380566
Anagram: A Content Anomaly Detector Resistant to Mimicry Attack, International Workshop on Recent Advances in Intrusion Detection, pp.226-248, 2006. ,
DOI : 10.1007/11856214_12
URL : http://packetstormsecurity.nl/papers/IDS/nids/Anagram.pdf
The base-rate fallacy and the difficulty of intrusion detection, ACM Transactions on Information and System Security, vol.3, issue.3, pp.186-205, 2000. ,
DOI : 10.1145/357830.357849
Statetul intrusion detection for highspeed networks, IEEE Symposium on Security and Privacy, pp.285-94, 2002. ,
Cost-based modeling for fraud and intrusion detection : results from the JAM project. DARPA Information Survivability Conference Exposition, pp.130-174, 2000. ,
Evaluation of intrusion detectors: a decision theory approach, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, pp.50-61, 2001. ,
DOI : 10.1109/SECPRI.2001.924287
An overview o issues in testing intrusion detection systems ?, 2003. ,
DOI : 10.6028/NIST.IR.7007
An experimentation workbench for intrusion detection systems, 1998. ,
Intrusion detection testing and benchmarking methodologies, Proceedings of the 1st IEEE inter national worksh op on information assurance, pp.63-72, 2003. ,
A methodology for testing intrusion detection systems, IEEE Transactions on Software Engineering, vol.22, issue.10, pp.43-51, 1997. ,
DOI : 10.1109/32.544350
URL : http://www.cs.purdue.edu/homes/clay/papers/intrusion-detection/A_Methedology_for_Testing_Intrusion_Detection_Systems.ps
The 1999 DARPA off-line intrusion detection evaluation, Computer Networks, vol.34, issue.4, pp.579-95, 2000. ,
DOI : 10.1016/S1389-1286(00)00139-0
LARIAT : Lincoln adaptable real-time information assurance test-bed. RAID, 2001. ,
DOI : 10.1109/aero.2002.1036158
URL : http://www.ll.mit.edu/IST/pubs/2001-rossey-IEEE_aeroconf.pdf
The 1998 Lincoln lab oratory IDS eval uation. A critique, RAID . LNCS, pp.145-151, 1907. ,
An analysis of the 1999 DARPA/Linco ln laboratory evaluation data for network anomaly detection. Florida tech, 2003. ,
Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme, Computer Networks, vol.46, issue.2, pp.253-72, 2004. ,
DOI : 10.1016/j.comnet.2004.03.033
Proposals on Assessment Environments for Anomaly-Based Network Intrusion Detection Systems, LNCS, vol.4347, pp.210-231, 2006. ,
DOI : 10.1007/11962977_17
Elements of information theory, 1991. ,
Le choix Baysien. Principes et pratiques, 2006. ,
An Evaluation of Naive Bayesian Anti-Spam Filtering, Proceedings of the Workshop on Machine Learning in the New Information Age, 11th European Conference on Machine Learning, pp.9-17, 2000. ,
An overview o issues in testing intrusion detection systems ?, 2003. ,
DOI : 10.6028/NIST.IR.7007
URL : http://csrc.nist.gov/publications/nistir/nistir-7007.pdf
The KDD process for extracting useful knowledge from volumes of data, Communications of the ACM, vol.39, issue.11, pp.27-34, 1996. ,
DOI : 10.1145/240455.240464
Sélection de caractéristiques : méthodes et applications (Doctoral dissertation, 2011. ,
Feature selection for classification, Intelligent Data Analysis, vol.1, issue.1-4, pp.131-156, 1997. ,
DOI : 10.1016/S1088-467X(97)00008-5
Toward integrating feature selection algorithms for classification and clustering, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, vol.17, pp.491-502, 2005. ,
The WEKA data mining software, ACM SIGKDD Explorations Newsletter, vol.11, issue.1, pp.10-18, 2009. ,
DOI : 10.1145/1656274.1656278