H. Pedram, J. Jia, and R. Daria, botcloud an emerging platform for cyber-attacks, 2012.

P. Kassidy, M. Clark, F. M. Warnier, and . Brazier, Botclouds -the future of cloud-based botnets?, Proceedings of the 1st International Conference on Cloud Computing and Services Science, pp.597-603, 2011.

T. Peng, C. Leckie, and K. Ramamohanarao, Survey of network-based defense mechanisms countering the DoS and DDoS problems, ACM Computing Surveys, vol.39, issue.1, 2007.
DOI : 10.1145/1216370.1216373

D. Dean, H. Nguyen, and X. Gu, UBL, Proceedings of the 9th international conference on Autonomic computing, ICAC '12, pp.191-200, 2012.
DOI : 10.1145/2371536.2371572

J. François, I. Aib, and R. Boutaba, FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks, IEEE/ACM Transactions on Networking, vol.20, issue.6, pp.1828-1841, 2012.
DOI : 10.1109/TNET.2012.2194508

D. Dash, B. Kveton, J. M. Agosta, E. Schooler, J. Chandrashekar et al., When gossip is good: Distributed probabilistic inference for detection of slow network intrusions, Proceedings of the 21st National Conference on Artificial Intelligence, pp.1115-1122, 2006.

C. V. Zhou, S. Karunasekera, and C. Leckie, A peer-to-peer collaborative intrusion detection system, Networks, 2005. Jointly held with the 2005 IEEE 7th Malaysia International Conference on Communication. 13th IEEE International Conference on, p.6, 2005.

J. Li, D. Lim, and K. Sollins, Dependency-based distributed intrusion detection, Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test on DETER Community Workshop on Cyber Security Experimentation and Test, pp.8-8, 2007.

J. Mirkovic and P. Reiher, D-ward: a source-end defense against flooding denialof-service attacks. Dependable and Secure Computing, IEEE Transactions on, vol.2, issue.3, pp.216-232, 2005.
DOI : 10.1109/tdsc.2005.35

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.103.5127

H. Badis, G. Doyen, and R. Khatoun, Understanding botclouds from a system perspective: A principal component analysis, 2014 IEEE Network Operations and Management Symposium (NOMS), 2014.
DOI : 10.1109/NOMS.2014.6838310

H. Badis, R. Khatoun, and G. Doyen, A factorial space for a system-based detection of botcloud activity, Sixth IFIP International Conference on New Technologies, Mobility and Security (NTMS'2014), 2014.

B. Chun, D. Culler, T. Roscoe, A. Bavier, L. Peterson et al., PlanetLab, ACM SIGCOMM Computer Communication Review, vol.33, issue.3, pp.3-12, 2003.
DOI : 10.1145/956993.956995

J. Ruiter and M. Warnier, Privacy Regulations for Cloud Computing: Compliance and Implementation in Theory and Practice, Computers, Privacy and Data Protection: an Element of Choice, pp.361-376, 2011.
DOI : 10.1007/978-94-007-0641-5_17

S. Wold, K. Esbensen, and P. Geladi, Principal component analysis. Chemometrics and Intelligent Laboratory Systems, Proceedings of the Multivariate Statistical Workshop for Geologists and Geochemists, pp.37-52, 1987.

M. Shyu, S. Chen, K. Sarinnapakorn, and L. Chang, A novel anomaly detection scheme based on principal component classifier, 2003.

D. Brauckhoff, K. Salamatian, and M. May, Applying PCA for Traffic Anomaly Detection: Problems and Solutions, IEEE INFOCOM 2009, The 28th Conference on Computer Communications, pp.2866-2870, 2009.
DOI : 10.1109/INFCOM.2009.5062248

URL : https://hal.archives-ouvertes.fr/hal-00620090

Y. Lee, Y. Yeh, and Y. Wang, Anomaly detection via online oversampling principal component analysis. Knowledge and Data Engineering, IEEE Transactions on, vol.25, issue.7, pp.1460-1470, 2013.
DOI : 10.1109/tkde.2012.99

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.684.4521

D. Carl and . Meyer, Matrix analysis and applied linear algebra, 2000.

P. Baldi, S. Brunak, Y. Chauvin, A. Claus, H. Andersen et al., Assessing the accuracy of prediction algorithms for classification: an overview, Bioinformatics, vol.16, issue.5, pp.412-424, 2000.
DOI : 10.1093/bioinformatics/16.5.412