[1] | V. Chandola, A. Banerjee and V. Kumar. Anomaly detection: A Survey, ACM Computing Surveys, 41(3), pp.1-58, 2009. |
[2] | C. F. Tsai, Y. F Hsu and C. Y. Lin, Intrusion detection by machine learning: A review, Expert Systems with Applications, 36(10), pp.11994-12000, 2009. |
[3] | P. Garcıa-Teodoroa, J. Diaz-Verdejo, G. Macia-Fernandez and E. Vazquez, Anomaly-based network intrusion detection: Techniques, systems and challenges, ELSEVIER, computers & security 28 (2009) 18–28. |
[4] | V. Jyothsna and V. Rama, A Review of anomaly based intrusion detection systems, International Journal of Computer Applications, Vol. 28– No.7, September 2011. |
[5] | A. O. Adetunmbi, S. O. Adeola, and O. A. Daramola, Analysis of KDD’99 intrusion detection dataset for selection of relevance features, Proceedings of the World Congress on Engineering and Computer Science, Francisco, USA, Vol I WCECS pp. 20-22, 2010. |
[6] | G. Meera Gandhi, Machine learning approach for attack prediction and classification using supervised learning algorithms, International Journal of Computer Science & Communication, Vol. 1, No. 2, pp. 247-250. July-December 2010. |
[7] | N. Huy and C. Deokjai, Application of data mining to network intrusion detection: Classifier Selection Model, APNOMS 2008, LNCS 5297, pp. 399–408, Springer-Verlag Berlin Heidelberg 2008. |
[8] | K. AbdJalil, and S. Mara, Comparison of machine learning algorithms performance in detecting network intrusion, In Proceedings of Networking and Information Technology (ICNIT), pp. 221 – 226, Manila 2010. |
[9] | S. Maheshkumar, and S. Gursel, Application of machine learning algorithms to KDD Intrusion detection dataset within misuse detection context, In proceedings of MLMTAP conference, pp. 209-215, 2003. |
[10] | B. Zadsr, and G. Daved, Anomaly detection algorithms for detecting SYN flooding attacks, Computer Communications, Vol. 29, Issue 9, pp. 1433–1442, 2006. |
[11] | K. Yogendra and Upendra, An efficient intrusion detection based on decision tree classifier using feature reduction, International Journal of Science and Research Publication, vol. 2, issue 1, January 2012. |
[12] | S. J. Stolfo, W. Fan, W. Lee, A. Prodromidis, and P. K. Chan, Cost based modeling for fraud and intrusion detection: Results from the jam project, discex, vol. 2, pp. 1130, 2000. |
[13] | R. P. Lippmann, D. J. Fried, I. Graf, J. W. Haines, K. R. Kendall. McClung, D. Weber, S. E. Webster, D. Wyschogrod, R. K. Cunningham, and M. A. Zissman, Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation, discex, vol. 2, p. 1012, 2001. |
[14] | W. Lee, S. J. Stolfo, and K. W. Mok, “Mining in a data-flow environment: Experience in network intrusion detection,” In Proceedings of the 5 th ACM SIGKDD, SanDiego, CA, pp. 114-124, 1999. |
[15] | KDD Cup 1999. Available on: http://kdd.ics.uci.edu/databases/kddcup 99/kddcup99.html, |
[16] | Nsl-kdd data set for network-based intrusion detection systems. Available on: http://nsl.cs.unb.ca/kdd/nslkdd.html |
[17] | H. Günes, A. NurZincir-Heywood, and M. Heywood, Selecting features for intrusion detection: A feature relevance analysis on KDD'99 intrusion Detection datasets, Proceedings of the third annual conference on privacy, security and trust, New Brunswick, Canada, October 2005. |
[18] | K. T. Chui, K. F. Tsang, C. K. Wu, F. H. Hung, H. R. Chi, H. S. -H. Chung, K. F. Man, and K. T. Ko, Cardiovascular diseases identification using electrocardiogram health identifier based on multiple criteria decision making, Expert Systems with Applications, vol. 42, no. 13, pp. 5684-5695, Aug. 2015. |