Research Journal of Applied Sciences

Year: 2017
Volume: 12
Issue: 3
Page No. 304 - 310

Survey Paper on Various Hybrid and Anomaly based Network Intrusion Detection System

Authors : J. Josemila Baby and J.R. Jeba

References

Abd-Eldayem, M.M., 2014. A proposed HTTP service based IDS. Egypt. Inf. J., 15: 13-24.
Direct Link  |  

Anderson, J.P., 1980. Computer security threat monitoring and surveillance. James. P. Anderson Co., Washington, Pennsylvania.

Arthur, M.P. and K. Kannan, 2016. Cross-layer based multiclass intrusion detection system for secure multicast communication of MANET in military networks. Wirel. Netw., 22: 1035-1059.
Direct Link  |  

Aydin, M.A., A.H. Zaim and K.G. Ceylan, 2009. A hybrid intrusion detection system design for computer network security. Comput. Electr. Eng., 35: 517-526.
CrossRef  |  Direct Link  |  

Casas, P., J. Mazel and P. Owezarski, 2012. Unsupervised network intrusion detection systems: Detecting the unknown without knowledge. Comput. Commun., 35: 772-783.
Direct Link  |  

Denning, D.E., 1987. An intrusion-detection model. IEEE Trans. Software Eng., SE-13: 222-232.
CrossRef  |  

Dhakar, M. and A. Tiwari, 2014. A novel data mining based hybrid intrusion detection framework. J. Inf. Comput. Sci., 9: 037-048.
Direct Link  |  

Eesa, A.S., Z. Orman and A.M.A. Brifcani, 2015. A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems. Expert Syst. Applic., 42: 2670-2679.
CrossRef  |  Direct Link  |  

Feng, W., Q. Zhang, G. Hu and J.X. Huang, 2014. Mining network data for intrusion detection through combining SVMs with ant colony networks. Future Gener. Comput. Syst., 37: 127-140.
CrossRef  |  Direct Link  |  

Joseph, J.F.C., B.S. Lee, A. Das and B.C. Seet, 2011. Cross-layer detection of sinking behavior in wireless ad hoc networks using SVM and FDA. IEEE Trans. Dependable Secure Comput., 8: 233-245.
CrossRef  |  

Karami, A. and M. Guerrero-Zapata, 2015. A fuzzy anomaly detection system based on hybrid PSO-kmeans algorithm in content-centric networks. Neurocomputing, 149: 1253-1269.
Direct Link  |  

Koshal, J. and M. Bag, 2012. Cascading of C4.5 decision tree and support vector machine for rule based intrusion detection system. Intl. J. Comput. Netw. Inf. Secur., 4: 8-20.
CrossRef  |  Direct Link  |  

Macia-Perez, F., F. Mora-Gimeno, D. Marcos-Jorquera, J.A. Gil-Martinez-Abarca, H. Ramos-Morillo and I. Lorenzo-Fonseca, 2011. Network intrusion detection system embedded on a smart sensor. IEEE Trans. Ind. Electron., 58: 722-732.
CrossRef  |  Direct Link  |  

Mafra, P.M., J.S. Fraga and A.O. Santin, 2014. Algorithms for a distributed IDS in MANETs. J. Comput. Syst. Sci., 80: 554-570.
Direct Link  |  

Moorthy, M. and S. Sathiyabama, 2012. A hybrid data mining based intrusion detection system for wireless local area networks. Intl. J. Comput. Appl., 49: 19-28.
Direct Link  |  

Muda, Z., W. Yassin, M.N. Sulaiman and N.I. Udzir, 2011. A K-means and naive bayes learning approach for better intrusion detection. Inform. Technol. J., 10: 648-655.
CrossRef  |  Direct Link  |  

Nadiammai, G.V. and M. Hemalatha, 2014. Effective approach toward intrusion detection system using data mining techniques. Egypt. Inf. J., 15: 37-50.
CrossRef  |  Direct Link  |  

Narayana, M.S., B.V.V.S. Prasad, A. Srividhya and K.P.R. Reddy, 2011. Data mining machine learning techniques: A study on abnormal anomaly detection system. Intl. J. Comput. Sci. Telecommun., 2: 8-14.
Direct Link  |  

Panda, M. and M.R. Patra, 2009. Ensembling rule based classifiers for detecting network intrusions. Proceedings of the 2009 International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom'09), October 27-28, 2009, IEEE, Kottayam, India, ISBN:978-1-4244-5104-3, pp: 19-22.

Panda, M., A. Abraham and M.R. Patra, 2012. A hybrid intelligent approach for network intrusion detection. Procedia Eng., 30: 1-9.
Direct Link  |  

Patel, J. and K. Panchal, 2015. Effective intrusion detection system using data mining technique. J. Emerging Technol. Innovative Res., 2: 1869-1876.
Direct Link  |  

Ponomarev, S. and T. Atkison, 2016. Industrial control system network intrusion detection by telemetry analysis. IEEE. Trans. Dependable Secure Comput., 13: 252-260.
CrossRef  |  Direct Link  |  

Priya, N. and S. Vasantha, 2014. Heuristic based hybrid network intrusion detection system: A novel approach. Asian J. Inf. Technol., 13: 733-738.
Direct Link  |  

Ramsey, B.W., B.E. Mullins, M.A. Temple and M.R. Grimaila, 2015. Wireless intrusion detection and device fingerprinting through preamble manipulation. IEEE. Trans. Dependable Secure Comput., 12: 585-596.
CrossRef  |  Direct Link  |  

Shakshuki, E.M., N. Kang and T.R. Sheltami, 2013. Eaack: A secure intrusion-detection system for Manets. IEEE. Trans. Ind. Electron., 60: 1089-1089.
CrossRef  |  Direct Link  |  

Tan, Z., A. Jamdagni, X. He, P. Nanda and R.P. Liu et al., 2015. Detection of denial-of-service attacks based on computer vision techniques. IEEE. Trans. Comput., 64: 2519-2533.
CrossRef  |  Direct Link  |  

Tesfahun, A. and D.L. Bhaskari, 2015. Effective hybrid intrusion detection system: A layered approach. Intl. J. Comput. Netw. Inf. Secur., 7: 35-41.
Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved