. Kdd-cup, Data, pp.2016-2018, 1999.

M. Bahrololum and M. Khaleghi, Anomaly Intrusion Detection System Using Gaussian Mixture Model, Convergence and Hybrid Information Technology, ICCIT '08, vol.1, pp.1162-1167, 2008.

M. M. Breunig, H. Kriegel, R. T. Ng, and J. Sander, LOF: Identifying Density-based Local Outliers, SIGMOD Rec, vol.29, issue.2, pp.93-104, 2000.

P. Casas, J. Mazel, and P. Owezarski, NETWORKING 2011: 10th International IFIP TC 6 Networking Conference, chapter UNADA: Unsupervised Network Anomaly Detection Using Sub-space Outliers Ranking, pp.40-51, 2011.

P. Casas, J. Mazel, and P. Owezarski, Unsupervised Network Intrusion Detection Systems: Detecting the Unknown without Knowledge, Computer Communications, vol.35, issue.7, pp.772-783, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00736278

C. Croux, P. Filzmoser, and M. R. Oliveira, Algorithms for Projection-Pursuit robust principal component analysis, vol.87, pp.218-225, 2007.

M. Ester, H. Kriegel, J. Sander, and X. Xu, A density-based algorithm for discovering clusters in large spatial databases with noise, pp.226-231, 1996.

R. Fontugne, P. Borgnat, P. Abry, and K. Fukuda, MAWILab: Combining Diverse Anomaly Detectors for Automated Anomaly Labeling and Performance Benchmarking, ACM CoNEXT '10, 2010.
URL : https://hal.archives-ouvertes.fr/ensl-00552071

A. Zimek, H. Kriegel, and P. Kröger, Outlier Detection Techniques, Tutorial Notes: SIAM SDM 2010, 2010.

D. R. Jensen and H. Solomon, A Gaussian Approximation to the Distribution of a Definite Quadratic Form, Journal of the American Statistical Association, vol.67, issue.340, pp.898-902, 1972.

K. Julisch, Clustering Intrusion Detection Alarms to Support Root Cause Analysis, ACM Transactions on Information and System Security, vol.6, pp.443-471, 2003.

A. Kind, M. P. Stoecklin, and X. Dimitropoulos, Histogram-based traffic anomaly detection. Network and Service Management, IEEE Transactions on, vol.6, issue.2, pp.110-121, 2009.

H. Kriegel, P. Kröger, E. Schubert, and A. Zimek, Advances in Knowledge Discovery and Data Mining: 13th Pacific-Asia Conference, year = 2009, pp.831-838

R. Kwitt and U. Hofmann, Unsupervised Anomaly Detection in Network Traffic by Means of Robust PCA, Computing in the Global Information Technology, pp.37-37, 2007.

A. Lakhina, M. Crovella, and C. Diot, Diagnosing Network-wide Traffic Anomalies, Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM '04, pp.219-230, 2004.

A. Lakhina, M. Crovella, and C. Diot, Mining anomalies using traffic feature distributions, ACM SIGCOMM Computer Communication Review, vol.35, issue.4, p.217, 2005.

K. Leung and C. Leck, Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters, Proceedings of the Twenty-eighth Australasian Conference on Computer Science, vol.38, pp.333-342, 2005.

M. D. Morris, Factorial Sampling Plans for Preliminary Computational Experiments, Technometrics, vol.33, issue.2, pp.161-174, 1991.

A. A. Olusola, A. S. Oladele, and D. O. Abosede, Analysis of KDD 99 Intrusion Detection Dataset for Selection of Relevance Features, In World Congress on Engineering and Computer Science, pp.162-168, 2010.

R. Hans-peter-kriegel, B. Schneider, N. Seeger, and . Beckmann, The R*-tree: an efficient and robust access method for points and rectangles, Sigmod Record, vol.19, pp.322-331, 1990.

L. Portnoy, E. Eskin, and S. Stolfo, Intrusion detection with unlabeled data using clustering, Proceedings of ACM CSS Workshop on Data Mining Applied to Security, pp.5-8, 2001.

H. Ringberg, A. Soule, J. Rexford, and C. Diot, Sensitivity of PCA for Traffic Anomaly Detection. SIGMETRICS Perform, Eval. Rev, vol.35, issue.1, pp.109-120, 2007.

M. Shyu, S. Chen, K. Sarinnapakorn, and L. Chang, A novel anomaly detection scheme based on principal component classifier, IEEE Foundations and New Directions of Data Mining Workshop, pp.171-179, 2003.

R. Sommer and V. Paxson, Outside the Closed World: On Using Machine Learning for Network Intrusion Detection, IEEE Symposium on Security and Privacy, vol.0, pp.305-316, 2010.

I. Syarif, G. Prugel-bennett, and A. , Networked Digital Technologies: 4th International Conference, chapter Unsupervised Clustering Approach for Network Anomaly Detection, 2012.

T. M. Thang and J. Kim, The Anomaly Detection by Using DBSCAN Clustering with Multiple Parameters, Information Science and Applications (ICISA), 2011 International Conference on, pp.1-5, 2011.

J. A. Tsakok, W. Bishop, and A. , Kennings. kd-Tree traversal techniques, Interactive Ray Tracing, pp.190-190, 2008.

Y. Yasami, S. Khorsandi, S. P. Mozaffari, and A. Jalalian, An unsupervised network anomaly detection approach by k-means clustering & id3 algorithms, Computers and Communications, pp.398-403, 2008.

A. Zimek, E. Schubert, and H. Kriegel, A Survey on Unsupervised Outlier Detection in High-dimensional Numerical Data, Stat. Anal. Data Min, vol.5, issue.5, pp.363-387, 2012.