, Data, pp.2016-2018, 1999.
Anomaly Intrusion Detection System Using Gaussian Mixture Model, Convergence and Hybrid Information Technology, ICCIT '08, vol.1, pp.1162-1167, 2008. ,
LOF: Identifying Density-based Local Outliers, SIGMOD Rec, vol.29, issue.2, pp.93-104, 2000. ,
, NETWORKING 2011: 10th International IFIP TC 6 Networking Conference, chapter UNADA: Unsupervised Network Anomaly Detection Using Sub-space Outliers Ranking, pp.40-51, 2011.
Unsupervised Network Intrusion Detection Systems: Detecting the Unknown without Knowledge, Computer Communications, vol.35, issue.7, pp.772-783, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00736278
Algorithms for Projection-Pursuit robust principal component analysis, vol.87, pp.218-225, 2007. ,
A density-based algorithm for discovering clusters in large spatial databases with noise, pp.226-231, 1996. ,
MAWILab: Combining Diverse Anomaly Detectors for Automated Anomaly Labeling and Performance Benchmarking, ACM CoNEXT '10, 2010. ,
URL : https://hal.archives-ouvertes.fr/ensl-00552071
Outlier Detection Techniques, Tutorial Notes: SIAM SDM 2010, 2010. ,
A Gaussian Approximation to the Distribution of a Definite Quadratic Form, Journal of the American Statistical Association, vol.67, issue.340, pp.898-902, 1972. ,
Clustering Intrusion Detection Alarms to Support Root Cause Analysis, ACM Transactions on Information and System Security, vol.6, pp.443-471, 2003. ,
Histogram-based traffic anomaly detection. Network and Service Management, IEEE Transactions on, vol.6, issue.2, pp.110-121, 2009. ,
, Advances in Knowledge Discovery and Data Mining: 13th Pacific-Asia Conference, year = 2009, pp.831-838
Unsupervised Anomaly Detection in Network Traffic by Means of Robust PCA, Computing in the Global Information Technology, pp.37-37, 2007. ,
Diagnosing Network-wide Traffic Anomalies, Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM '04, pp.219-230, 2004. ,
Mining anomalies using traffic feature distributions, ACM SIGCOMM Computer Communication Review, vol.35, issue.4, p.217, 2005. ,
Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters, Proceedings of the Twenty-eighth Australasian Conference on Computer Science, vol.38, pp.333-342, 2005. ,
Factorial Sampling Plans for Preliminary Computational Experiments, Technometrics, vol.33, issue.2, pp.161-174, 1991. ,
Analysis of KDD 99 Intrusion Detection Dataset for Selection of Relevance Features, In World Congress on Engineering and Computer Science, pp.162-168, 2010. ,
The R*-tree: an efficient and robust access method for points and rectangles, Sigmod Record, vol.19, pp.322-331, 1990. ,
Intrusion detection with unlabeled data using clustering, Proceedings of ACM CSS Workshop on Data Mining Applied to Security, pp.5-8, 2001. ,
Sensitivity of PCA for Traffic Anomaly Detection. SIGMETRICS Perform, Eval. Rev, vol.35, issue.1, pp.109-120, 2007. ,
A novel anomaly detection scheme based on principal component classifier, IEEE Foundations and New Directions of Data Mining Workshop, pp.171-179, 2003. ,
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection, IEEE Symposium on Security and Privacy, vol.0, pp.305-316, 2010. ,
Networked Digital Technologies: 4th International Conference, chapter Unsupervised Clustering Approach for Network Anomaly Detection, 2012. ,
The Anomaly Detection by Using DBSCAN Clustering with Multiple Parameters, Information Science and Applications (ICISA), 2011 International Conference on, pp.1-5, 2011. ,
Kennings. kd-Tree traversal techniques, Interactive Ray Tracing, pp.190-190, 2008. ,
An unsupervised network anomaly detection approach by k-means clustering & id3 algorithms, Computers and Communications, pp.398-403, 2008. ,
A Survey on Unsupervised Outlier Detection in High-dimensional Numerical Data, Stat. Anal. Data Min, vol.5, issue.5, pp.363-387, 2012. ,