—In this paper we present a methodology for detecting traffic anomalies. To accomplish that, and as a demarcation from similar works, we combine multi-scale and multi-criteria analysis with a tomography process analysis. With a complete knowledge of traffic anomalies, we intend to define anomalies signatures that could be used in a large range of scopes as traffic engineering, routing and intrusion detection systems, and much more. Traffic anomalies, anomaly profile, overlay network routing