Research Journal of Applied Sciences
Year:
2014
Volume:
9
Issue:
5
Page No.
257 - 261
References
Anonymous, 2009. Intrusion detection systems. Information Assurance Tools Report, 6th Edn., September 25, 2009. http://iac.dtic.mil/iatac/download/intrusion_detection.pdf.
Biles, S., 2003. Detecting the unknown with snort and Statistical Packet Anomaly Detection Engine (SPADE). Computer Security Online Ltd., Technical Report. http://webpages.cs.luc.edu/~pld/courses/447/sum08/class6/biles.spade.pdf.
Estevez-Tapiador, J.M., P. Garcia-Teodoro and J.E. Diaz-Verdejo, 2004. Anomaly detection methods in wired networks: A survey and taxonomy. Comput. Commun., 27: 1569-1584.
CrossRef | Direct Link | Gaikwad, V.S. and P.J. Kulkarni, 2012. One versus all classification in network intrusion detection using decision tree. Int. J. Sci. Res. Publ., 2: 1-5.
Direct Link | Garcia-Teodoro, P., J. Diaz-Verdejo, G. Macia-Fernandez and E. Vazquez, 2009. Anomaly-based network intrusion detection: Techniques, systems and challenges. Comput. Secur., 28: 18-28.
CrossRef | Direct Link | Kumar, S., 2007. Survey of current network intrusion detection techniques. http://www.cs.wustl.edu/~jain/cse571-07/ftp/ids.pdf.
Patcha, A. and J.M. Park, 2007. An overview of anomaly detection techniques: Existing solutions and latest technological trends. Comput. Networks, 51: 3448-3470.
CrossRef | Zhang, Y. and W. Lee, 2000. Intrusion detection in wireless ad-hoc networks. Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, August 6-11, 2000, Boston, MA., USA., pp: 275-283.