A. Aho and M. Corasick, Efficient string matching: an aid to bibliographic search, Communications of the ACM18, 1975.
DOI : 10.1145/360825.360855

L. Tan, B. Brotherton, and T. Sherwood, Bit-split string-matching engines for intrusion detection and prevention, ACM Transactions on Architecture and Code Optimization, vol.3, issue.1, pp.3-34, 2006.
DOI : 10.1145/1132462.1132464

L. Tan and T. Sherwood, Architectures for Bit-Split String Scanning in Intrusion Detection, IEEE Micro: Micro's Top Picks from Computer Architecture Conferences, 2006.

P. Porras, D. Schnackenberg, S. Staniford-chen, M. Stillman, and F. Wu, The common intrusion detection framework architecture Site web : http://gost, 1998.

R. Feiertag, C. Kahn, P. Porras, D. Schackenberg, S. Staniford-chen et al., A common intrusion specification language, 1999.

C. Kahn, D. Bolinger, and D. Schackenberg, Communication in the common intrusion detection framework v 0

K. Anagnostakis, E. Markatos, S. Antonatos, and M. Polychronakis, E2XB: A domain specific string matching algorithm for intrusion detection, Proceedings of the 18th IFIP International Information Security Conference (SEC2003), 2003.

Z. Baker and V. Prasanna, A Methodology for Synthesis of Efficient Intrusion Detection Systems on FPGAs, 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines, 2004.
DOI : 10.1109/FCCM.2004.6

D. Curry and H. Debar, Intrusion detection message exchange format data model and extensible markup language (xml) document type definition, 2001.

H. Debar, M. Dacier, and A. Wespi, A revised taxonomy for intrusion-detection systems, Annales des Télécommunications, 2000.

C. Kruegel, F. Valeur, G. Vigna, and R. Kemmerer, Stateful Intrusion Detection for High-Speed Networks, Proceedings of the IEEE Symposium on Security and Privacy, pp.285-294, 2002.

R. Boyer and J. Moore, A fast string searching algorithm, Communications of the ACM20, 1977.
DOI : 10.1145/359842.359859

S. Wu and U. Manber, A fast algorithm for multi-pattern searching, 1994.

M. Fisk and G. Varghese, An analysis of fast string matching applied to content-based forwarding and intrusion detection, 2002.

C. J. Coit, S. Staniford, and J. Mcalerney, Towards faster pattern matching for intrusion detection, or exceeding the speed of snort, Proceedings of the 2nd DARPA Information Survivability Conference and Exposition (DISCEX II), 2002.

H. Debar, M. Dacier, and A. Wespi, Towards a taxonomy of intrusion-detection systems, Computer Networks, vol.31, issue.8, pp.805-822, 1999.
DOI : 10.1016/S1389-1286(98)00017-6

S. Li, J. Torresen, and O. Soraasen, Exploiting Reconfigurable Hardware for Network Security, Proceedings IEEE Symposium of Field-Programmable Custom Computing Machines (FCCM '03), 2003.

H. Bos and K. Huang, A Network Instruction Detection System on IXP1200 Network Processors with Support for Large Rule Sets, 2004.

M. Necker, D. Contis, and D. Schimmel, TCP-Stream reassembly and state tracking in hardware, Proceedings. 10th Annual IEEE Symposium on Field-Programmable Custom Computing Machines, 2002.
DOI : 10.1109/FPGA.2002.1106687

N. Tuck, T. Sherwood, B. Calder, and G. Varghese, Deterministic Memory- Efficient String Mathcing for Intrusion Detection, Proceedings of the IEEE Infocom Conference, 2004.

H. Song and J. Lockwood, Efficient packet classification for network intrusion detection using FPGA, Proceedings of the 2005 ACM/SIGDA 13th international symposium on Field-programmable gate arrays , FPGA '05, 2005.
DOI : 10.1145/1046192.1046223

Y. Sugawara, M. Inaba, and K. Hiraki, Over 10 Gbps string matching mechanism for multi-stream packet scanning systems, 14th International Conference on Field Programmable Logic and Application (FPL), 2004.

R. Liu, N. Huang, C. Chen, and C. N. Kao, A fast string-matching algorithm for network processor-based intrusion detection system, ACM Transactions on Embedded Computing Systems, vol.3, issue.3, pp.614-633, 2004.
DOI : 10.1145/1015047.1015055

L. Tan and T. Sherwood, A High Throughput String Matching Architecture for Intrusion Detection and Prevention, Proceedings of the 32nd Annual International Symposium on Computer Architecture (ISCA), 2005.
DOI : 10.1145/1080695.1069981

I. Sourdis and D. Pnevmatikatos, Fast large-scale string matching for a 10 Gbps FPGA-based network intrusion detection system, 13th International Conference on Field Programmable Logic and Applications, 2003.

Y. Cho and W. Mangione-smith, Fast Reconfiguring Deep Packet Filter for 1+ Gigabit Network, 13th Annual IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM'05), 2005.
DOI : 10.1109/FCCM.2005.34

F. Yu, R. Katz, and T. V. Lakshman, Gigabit rate packet pattern-matching using TCAM, Proceedings of the Twelfth IEEE International Conference on Network Protocols (ICNP), 2004.

T. Abbes, A. Haloi, and M. Rusinowitch, High Performance Intrusion Detection using Traffic Classification, Proceedings of the IEEE International Conference on Advances in Intelligent Systems (AISTA2004), 2004.
URL : https://hal.archives-ouvertes.fr/inria-00100008

N. Jacob and C. Brodley, Offloading IDS Computation to the GPU, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 2006.
DOI : 10.1109/ACSAC.2006.35

I. Sourdis and D. Pnevmatikatos, Pre-Decoded CAMs for Efficient and High-Speed NIDS Pattern Matching, 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines, pp.258-267, 2004.
DOI : 10.1109/FCCM.2004.46

L. Marziale, G. Richard, and V. Roussev, Massive threading: Using GPUs to increase the performance of digital forensics tools, Digital Investigation, pp.73-81, 2007.
DOI : 10.1016/j.diin.2007.06.014

W. Yang, B. Fang, B. Liu, and H. Zhang, Intrusion detection system for highspeed network, Computer Communications, vol.27, issue.13, p.15, 2004.

G. Munz and G. Carle, Real-time Analysis of Flow Data for Network Attack Detection, 2007 10th IFIP/IEEE International Symposium on Integrated Network Management, 2007.
DOI : 10.1109/INM.2007.374774

N. Goyal, J. Ormont, R. Smith, C. Sankaralingam, and . Estan, Signature matching in network processing using SIMD/GPU architectures, 1628.

R. Sekar, V. Guang, S. Verma, and T. Shanbhag, A high-performance network intrusion detection system, Proceedings of the 6th ACM conference on Computer and communications security , CCS '99, 1999.
DOI : 10.1145/319709.319712

C. Wu, J. Yin, Z. Cai, E. Zhu, and J. Chen, A Hybrid Parallel Signature Matching Model for Network Security Applications Using SIMD GPU, Proceedings of the 8th International Symposium on Advanced Parallel Processing Technologies APPT '09, 2009.
DOI : 10.1145/1402958.1402983

A. Ferro, F. Liberal, A. Muhoz, I. Delgado, and A. Beaumont, Software architecture based on multiprocessor platform to apply complex intrusion detection techniques, Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology, 2005.
DOI : 10.1109/CCST.2005.1594847

J. Erceau and J. Ferber, L'intellligence Artificielle Distribuée, La Recherche, vol.23, 1991.

Z. Guessoum, Un environnement opérationnel de conception et de réalisation de systèmes multi ? agents, Thèse de l'université de paris 6, Laforia, 1996.

J. Ferber, Les Systèmes Multi-Agents : Vers une Intelligence Collective, 1997.

M. Aldwairi, T. Conte, and P. Franzon, Configurable string matching hardware for speeding up intrusion detection, Workshop on Architectural Support for Security and Anti-virus (WASSA) Held in Cooperation with ASPLOS XI, 2005.
DOI : 10.1145/1055626.1055640

C. Kruegel and T. Toth, Using Decision Trees to Improve Signature-Based Intrusion Detection, Proc. Int'l Symp. Recent Advances in Intrusion Detection, 2003.
DOI : 10.1007/978-3-540-45248-5_10

M. Sung, A. Kumar, L. E. Li, J. Wang, and J. J. Xu, Scalable and Efficient Data Streaming Algorithms for Detecting Common Content in Internet Traffic, International Conference on Data Engineering Workshops (ICDEW), 2006.

M. Almgren, U. Lindqvist, and E. Jonsson, A Multi-Sensor Model to Improve Automated Attack Detection, Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection, 2008.
DOI : 10.1007/978-3-540-87403-4_16

G. Vasiliadis, S. Antonatos, M. Polychronakis, E. P. Markatos, and S. Ioannidis, Gnort: High Performance Network Intrusion Detection Using Graphics Processors, RAID'08, Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection, 2008.
DOI : 10.1007/978-3-540-87403-4_7

G. Vasiliadis, M. Polychronakis, S. Antonatos, E. P. Markatos, and S. Ioannidis, Regular Expression Matching on Graphics Hardware for Intrusion Detection
DOI : 10.1007/978-3-642-04342-0_14

J. Ferber, Multi Agent System: An Introduction to Distributed Artificial Intelligence, 1999.

J. Ferber, Les Systèmes Multi-Agents : Vers une intelligence collective, 1995.

X. Wang and H. Li, Improvement and Implementation of Network Intrusion Detection System, Journal of Communication and Computer, vol.3, issue.114, pp.1548-7709, 2006.

J. Briot and Y. Demazeau, Introduction aux agents : Principes et architecture des systèmes multi-agents, 2001.

M. Blanc, J. Briffaut, P. Clemente, M. Gad-el-rab, and C. Toinard, A Collaborative Approach for Access Control, Intrusion Detection and Security Testing, International Symposium on Collaborative Technologies and Systems (CTS'06), 2006.
DOI : 10.1109/CTS.2006.1

URL : https://hal.archives-ouvertes.fr/hal-00083350

M. Becchi and P. Crowley, A hybrid finite automaton for practical deep packet inspection, Proceedings of the 2007 ACM CoNEXT conference on , CoNEXT '07, 2007.
DOI : 10.1145/1364654.1364656

Y. Lin, Y. Chang, Y. Lin, and Y. Lai, Resource allocation in network processors for memory access intensive applications, Journal of Systems and Software, vol.80, issue.7, 2007.

O. Salem, A. Mehaoua, S. Vaton, and A. Gravey, Flooding attacks detection and victim identification over high speed networks, 2009 Global Information Infrastructure Symposium, 2009.
DOI : 10.1109/GIIS.2009.5307058

URL : https://hal.archives-ouvertes.fr/hal-00504328

G. Adouko, F. Charot, and C. Wolinski, Exploitation optimale des circuits reconfigurables FPGA pour la mise en oeuvre d'un moteur de recherche de motifs " . RenPar'18 / SympA, 2008.
URL : https://hal.archives-ouvertes.fr/hal-00202772

Z. K. Baker and V. K. Prasanna, Time and area efficient pattern matching on FPGAs, Proceeding of the 2004 ACM/SIGDA 12th international symposium on Field programmable gate arrays , FPGA '04, 2004.
DOI : 10.1145/968280.968312

Y. Demazeau, From Interactions to Collective Behaviour in Agent-Based Systems, Proceedings of the First European Conference on Cognitive Science (ECCS'95), pp.117-132, 1995.

D. Schuehler, J. Moscola, and J. Lockwood, Architecture for a hardware-based, TCP/IP content-processing system, IEEE Micro, vol.24, issue.1, pp.62-69, 2004.
DOI : 10.1109/MM.2004.1269000

S. Sinha, F. Jahanian, and J. M. Patel, WIND: Workload-Aware INtrusion Detection, Symposium on Recent Advances in Intrusion Detection. (RAID'06), 2006.
DOI : 10.1007/11856214_15

G. Navarro and R. Baeza-yates, Fast and practical approximate string matching, Information Processing Letters, vol.59, pp.21-27, 1996.

G. Navarro and R. Baeza-yates, Faster Approximate String Matching, Algorithmica, vol.23, issue.2, pp.127-158, 1999.
DOI : 10.1007/PL00009253

M. Wooldridge, N. R. Jennings, and D. Kinny, The Gaia Methodology for Agent- Oriented Analysis and Design, Autonomous Agents and Multi-Agent Systems, vol.3, issue.3, pp.285-312, 2000.
DOI : 10.1023/A:1010071910869

M. Cossentino and C. , Pot ts A CASE tool supported methodology for the design of multi-agent systems, Proceeding. The 2002 International Conference on Software Engineering Research and Practice (SERP'02) Las Vegas (NV), 2002.

K. Sunghyun and L. Heejo, Reducing Payload Scans for Attack Signature Matching Using Rule Classification " . Information Security and Privacy, pp.350-360, 2008.

N. Desai, Increasing performance in high-speed NIDS, a look at snort's internals, 2002.

M. Norton and D. Roelker, Hi-performance multi-rule inspection engine, 2004.

A. Yoshioka, S. Shaikot, and M. Kim, Rule Hashing for Efficient Packet Classification in Network Intrusion Detection, 2008 Proceedings of 17th International Conference on Computer Communications and Networks, pp.1-6, 2008.
DOI : 10.1109/ICCCN.2008.ECP.120

E. Ukkonen, Approximate string-matching with q-grams and maximal matches, Theoretical Computer Science, vol.92, issue.1, pp.191-211, 1992.
DOI : 10.1016/0304-3975(92)90143-4

W. Chang and T. Marr, Approximate string matching and local similarity, Proceedings of the 5th Annual Symposium on Combinatorial Pattern Matching, pp.259-273, 1994.
DOI : 10.1007/3-540-58094-8_23

E. Sutinen and J. Tarhio, On using q-gram locations in approximate string matching, Proceedings of the Third Annual European Symposium on Algorithms, pp.327-340, 1995.
DOI : 10.1007/3-540-60313-1_153

C. Clark, W. Lee, D. Schimmel, D. Contis, M. Kone et al., A hardware platform for network intrusion detection and prevention, Proceedings of the 3rd Workshop on Network Processors and Applications (NP3), 2004.
DOI : 10.1016/B978-012088476-6/50007-1

S. Kang, I. Song, Y. Lee, and T. Kwon, Design and implementation of a multigigabit intrusion and virus/worm detection system, Proceedings of the International Conference on Communications (ICC'06), 2006.

N. Foukia, J. Hulaas, and J. Harms, Intrusion Detection with Mobile Agents, Proceedings of the 11th Annual Internet Society Conference, 2001.

G. Helmer, J. Wong, Y. Wang, V. Honavar, and L. Miller, Lightweight agents for intrusion detection, Journal of Systems and Software, vol.67, issue.2, pp.109-122, 2003.
DOI : 10.1016/S0164-1212(02)00092-4

D. Boughaci, H. Drias, A. Bendib, Y. Bouznit, and B. Benhamou, Distributed Intrusion Detection Framework based on Autonomous and Mobile Agents, 2006 International Conference on Dependability of Computer Systems, pp.248-255, 2006.
DOI : 10.1109/DEPCOS-RELCOMEX.2006.19

G. Ramachandran and D. Hart, A P2P intrusion detection system based on mobile agents, Proceedings of the 42nd annual Southeast regional conference on , ACM-SE 42, pp.185-190, 2004.
DOI : 10.1145/986537.986581

R. Zhang, D. Qian, C. Ba, W. Wu, and X. Guo, Multi-agent based intrusion detection architecture, Proceedings 2001 International Conference on Computer Networks and Mobile Computing, pp.494-501, 2001.
DOI : 10.1109/ICCNMC.2001.962638

K. Boudaoud and C. Mccathienevile, An intelligent agent-based model for security management, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications, pp.877-882, 2002.
DOI : 10.1109/ISCC.2002.1021776

M. Bernardes and E. Moreira, Implementation of an intrusion detection system based on mobile agents, Proceedings International Symposium on Software Engineering for Parallel and Distributed Systems PDSE-99, pp.158-164, 2000.
DOI : 10.1109/PDSE.2000.847862

K. Boudaoud and Z. Guessoum, A Multi-agents System for Network Security Management Proceeding of Telecommunication Network Intelligence, IFIP TC6 WG6.7 Sixth International Conference on Intelligence in Networks Harmen R. van As, pp.172-189, 2000.

D. Dasgupta, F. Gonzales, K. Yallapu, J. Gomez, and R. Yarramsetti, CIDS: An agent-based intrusion detection system, Computers & Security, vol.24, issue.5, pp.382-398, 2005.
DOI : 10.1016/j.cose.2005.01.004

X. Qin, W. Lee, L. Lewis, and J. B. Cabrera, Integrating Intrusion detection and Network Management, Proceeding of the 8th IEEE/IFIP Network Operations and Management Symposium (NMOS), pp.329-344, 2002.

D. J. Ragsdale, C. A. Carver, J. W. Humphries, and U. W. Pooch, Adaptation techniques for intrusion detection and intrusion response systems, SMC 2000 Conference Proceedings. 2000 IEEE International Conference on Systems, Man and Cybernetics. 'Cybernetics Evolving to Systems, Humans, Organizations, and their Complex Interactions' (Cat. No.00CH37166), pp.2344-2349, 2000.
DOI : 10.1109/ICSMC.2000.884341

S. Snapp, J. Brentano, G. Dias, T. Goan, L. Heberlein et al., DIDS (distributed intrusion detection system) ? motivation, architecture, and an early prototype, Proceedings of the 14th national computer security conference, 1991.

M. Asaka, S. Okazawa, A. Taguchi, and S. Goto, A Method of Tracing Intruders by Use of Mobile Agents, INET '99, 1999.

J. Balasubramaniyan, J. Fernandez, D. Isacoff, E. H. Spafford, and D. Zamboni, An architecture for intrusion detection using autonomous agents, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217), 1998.
DOI : 10.1109/CSAC.1998.738563

A. L. Servin and D. Kudenko, Multi-agent Reinforcement Learning for Intrusion Detection, Adaptive Learning Agents and Multi Agent Systems, pp.158-170, 2007.
DOI : 10.1007/978-3-540-77949-0_15

D. Ye, Q. Bai, M. Zhang, and Z. Ye, P2P Distributed Intrusion Detections by Using Mobile Agents, Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008), pp.259-265, 2008.
DOI : 10.1109/ICIS.2008.21

C. V. Zhou, C. Leckie, and S. Karunasekera, A survey of coordinated attacks and collaborative intrusion detection, Computers & Security, vol.29, issue.1, 2010.
DOI : 10.1016/j.cose.2009.06.008

N. R. Jennings, K. Sycara, and M. Wooldridge, A Roadmap of Agent Research and Development, Autonomous Agents and Multi-Agent Systems, vol.1, issue.1, pp.7-38, 1998.
DOI : 10.1023/A:1010090405266

P. Kannadiga and M. Zulkernine, DIDMA: A Distributed Intrusion Detection System Using Mobile Agents, Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks (SNPD/SAWN'05), pp.238-245, 2005.
DOI : 10.1109/SNPD-SAWN.2005.31

G. Picard, Méthodologie de développement de systèmes multi-agents adaptatifs et conception de logiciels à fonctionnalité émergente, thèse de doctorat de l'Université PAUL SABATIER, 2004.

J. Ferber and O. Gutknecht, Aalaadin : a meta-model for the analysis and design of organizations in multi-agent systems, 3rd IEEE International Conference on Multi-Agent Systems, pp.128-135, 1998.

D. Kinny, M. Georgeff, and A. Rao, A methodology and modelling technique for systems of BDI agents, proceedings of the Seventh European Workshop on Modelling Autonomous Agents in a Multi-Agent World, pp.56-71, 1997.
DOI : 10.1007/BFb0031846

J. Anderson, Computer Security Threat Monitoring and Surveillance, 1980.

D. Denning, An Intrusion-Detection Model, IEEE Transactions on Software Engineering, pp.222-232, 1987.

D. Gusfield, Algorithms on strings, trees, and sequences: Computer Science and Computational Biology, 1997.
DOI : 10.1017/CBO9780511574931

B. and L. Saux, Classification non exclusive et personnalisation par apprentissage: application à la navigation dans les bases d'images, Thèse de doctorat, 2003.

N. Friedman and M. Goldszmidt, Building classifiers using bayesian networks, Proceeding of American Association for Artificial Intelligence Conference (AAAI'96), 1996.

N. Ben-amor, S. Benferhat, and Z. Elouedi, Naive Bayes vs decision trees in intrusion detection systems, Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), pp.420-424, 2004.

N. Abouzakhar, A. Gani, G. Manson, M. Abuitbel, and D. King, Bayesian Learning Networks Approach to Cybercrime Detection, proceedings of the 2003 PostGraduate Networking Conference, 2003.

T. Gamer, M. Scholller, and R. Bless, A Granularity Adaptive System for in- Network Attack Detection, Proceedings of the IEEE / IST Workshop on Monitoring, Attack Detection and Mitigation, 2006.

J. Undercoer, J. Pinkston, A. Joshi, and T. Finin, A Target-Centric Ontology for Intrusion Detection, Proceedings of the IJCAI-03 Workshop on Ontologies and Distributed Systems, 2004.

E. Lehtihet and N. Agoulmine, Towards Integrating Network Management Interfaces, Network Operations and Management Symposium, NOMS-2008, 2008.

H. Derbel, N. Agoulmine, and M. Salaun, ANEMA: Autonomic network management architecture to support self-configuration and self-optimization in IP networks, Computer Networks, vol.53, issue.3, 2008.
DOI : 10.1016/j.comnet.2008.10.022

J. Strassner, N. Agoulmine, and E. Lehtihet, A Novel Autonomic Computing Architecture, International Transactions on Systems, Science and Applications Journal, vol.3, issue.1, pp.64-79, 2007.

A. Zaidi, N. Agoulmine, and T. Kenaza, IDS Adaptation for an Efficient Detection in High-Speed Networks, 2010 Fifth International Conference on Internet Monitoring and Protection, 2010.
DOI : 10.1109/ICIMP.2010.10

]. A. Zak10-b, T. Zaidi, N. Kenaza, and . Agoulmine, Piecewise Classification of Attack Patterns for Efficient Network Intrusion Detection, International Conference on Security and Cryptography (SECRYPT'10), 2010.

A. Zaidi, T. Kenaza, and N. Agoulmine, Clustering approach for false alerts reducing in behavioral based intrusion detection systems, International Conference on Machine and Web Intelligence -(ICMWI'2010)