Research Journal of Applied Sciences
Year:
2017
Volume:
12
Issue:
3
Page No.
304 - 310
References
Abd-Eldayem, M.M., 2014. A proposed HTTP service based IDS. Egypt. Inf. J., 15: 13-24.
Direct Link | Anderson, J.P., 1980. Computer security threat monitoring and surveillance. James. P. Anderson Co., Washington, Pennsylvania.
Arthur, M.P. and K. Kannan, 2016. Cross-layer based multiclass intrusion detection system for secure multicast communication of MANET in military networks. Wirel. Netw., 22: 1035-1059.
Direct Link | Aydin, M.A., A.H. Zaim and K.G. Ceylan, 2009. A hybrid intrusion detection system design for computer network security. Comput. Electr. Eng., 35: 517-526.
CrossRef | Direct Link | Casas, P., J. Mazel and P. Owezarski, 2012. Unsupervised network intrusion detection systems: Detecting the unknown without knowledge. Comput. Commun., 35: 772-783.
Direct Link | Denning, D.E., 1987. An intrusion-detection model. IEEE Trans. Software Eng., SE-13: 222-232.
CrossRef | Dhakar, M. and A. Tiwari, 2014. A novel data mining based hybrid intrusion detection framework. J. Inf. Comput. Sci., 9: 037-048.
Direct Link | Eesa, A.S., Z. Orman and A.M.A. Brifcani, 2015. A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems. Expert Syst. Applic., 42: 2670-2679.
CrossRef | Direct Link | Feng, W., Q. Zhang, G. Hu and J.X. Huang, 2014. Mining network data for intrusion detection through combining SVMs with ant colony networks. Future Gener. Comput. Syst., 37: 127-140.
CrossRef | Direct Link | Joseph, J.F.C., B.S. Lee, A. Das and B.C. Seet, 2011. Cross-layer detection of sinking behavior in wireless ad hoc networks using SVM and FDA. IEEE Trans. Dependable Secure Comput., 8: 233-245.
CrossRef | Karami, A. and M. Guerrero-Zapata, 2015. A fuzzy anomaly detection system based on hybrid PSO-kmeans algorithm in content-centric networks. Neurocomputing, 149: 1253-1269.
Direct Link | Koshal, J. and M. Bag, 2012. Cascading of C4.5 decision tree and support vector machine for rule based intrusion detection system. Intl. J. Comput. Netw. Inf. Secur., 4: 8-20.
CrossRef | Direct Link | Macia-Perez, F., F. Mora-Gimeno, D. Marcos-Jorquera, J.A. Gil-Martinez-Abarca, H. Ramos-Morillo and I. Lorenzo-Fonseca, 2011. Network intrusion detection system embedded on a smart sensor. IEEE Trans. Ind. Electron., 58: 722-732.
CrossRef | Direct Link | Mafra, P.M., J.S. Fraga and A.O. Santin, 2014. Algorithms for a distributed IDS in MANETs. J. Comput. Syst. Sci., 80: 554-570.
Direct Link | Moorthy, M. and S. Sathiyabama, 2012. A hybrid data mining based intrusion detection system for wireless local area networks. Intl. J. Comput. Appl., 49: 19-28.
Direct Link | Muda, Z., W. Yassin, M.N. Sulaiman and N.I. Udzir, 2011. A K-means and naive bayes learning approach for better intrusion detection. Inform. Technol. J., 10: 648-655.
CrossRef | Direct Link | Nadiammai, G.V. and M. Hemalatha, 2014. Effective approach toward intrusion detection system using data mining techniques. Egypt. Inf. J., 15: 37-50.
CrossRef | Direct Link | Narayana, M.S., B.V.V.S. Prasad, A. Srividhya and K.P.R. Reddy, 2011. Data mining machine learning techniques: A study on abnormal anomaly detection system. Intl. J. Comput. Sci. Telecommun., 2: 8-14.
Direct Link | Panda, M. and M.R. Patra, 2009. Ensembling rule based classifiers for detecting network intrusions. Proceedings of the 2009 International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom'09), October 27-28, 2009, IEEE, Kottayam, India, ISBN:978-1-4244-5104-3, pp: 19-22.
Panda, M., A. Abraham and M.R. Patra, 2012. A hybrid intelligent approach for network intrusion detection. Procedia Eng., 30: 1-9.
Direct Link | Patel, J. and K. Panchal, 2015. Effective intrusion detection system using data mining technique. J. Emerging Technol. Innovative Res., 2: 1869-1876.
Direct Link | Ponomarev, S. and T. Atkison, 2016. Industrial control system network intrusion detection by telemetry analysis. IEEE. Trans. Dependable Secure Comput., 13: 252-260.
CrossRef | Direct Link | Priya, N. and S. Vasantha, 2014. Heuristic based hybrid network intrusion detection system: A novel approach. Asian J. Inf. Technol., 13: 733-738.
Direct Link | Ramsey, B.W., B.E. Mullins, M.A. Temple and M.R. Grimaila, 2015. Wireless intrusion detection and device fingerprinting through preamble manipulation. IEEE. Trans. Dependable Secure Comput., 12: 585-596.
CrossRef | Direct Link | Shakshuki, E.M., N. Kang and T.R. Sheltami, 2013. Eaack: A secure intrusion-detection system for Manets. IEEE. Trans. Ind. Electron., 60: 1089-1089.
CrossRef | Direct Link | Tan, Z., A. Jamdagni, X. He, P. Nanda and R.P. Liu
et al., 2015. Detection of denial-of-service attacks based on computer vision techniques. IEEE. Trans. Comput., 64: 2519-2533.
CrossRef | Direct Link | Tesfahun, A. and D.L. Bhaskari, 2015. Effective hybrid intrusion detection system: A layered approach. Intl. J. Comput. Netw. Inf. Secur., 7: 35-41.
Direct Link |