Protocol Anomaly Detection for Network-based Intrusion Detection, SANS Institute, GSEC Practical Assignment Version 1.2f, 2001 M.
ACM Press, “Learning non stationary models of normal network traffic for detecting novel attacks,” in Eighth ACM SIGKDD international conference on Knowledge discovery and data mining.
Denning, An Intrusion-Detection Model, IEEE Transactions on Software Engineering, vol. of Computer Science and Engineering, IIT Khargpur 2008 Guy Bruneau – GSEC Version 1.2f,” The History and Evolution of Intrusion Detection”, SANS Institute 2001.
Dinakara K, “Anomaly Based Network Intrusion Detection System”, Thesis Report, Dept. Dickerson, “Fuzzy network profiling for intrusion detection,” In Proceedings of the 19th International Conference of the North American Fuzzy Information Processing Society (NAFIPS), 13-15 July 2000, pp. Debar H, Becker M, and Siboni D, “A Neural Network Component for an Intrusion Detection System”, IEEE Computer Society Symposium on Research in Security and Privacy, Los Alamitos Oakland, CA, pp. DK Bhattacharyya and JK Kalita, 2014, “Network Anomaly Detection: A Machine Learning Perspective”, CRC Press, Taylor & Francis Group, International Standard Book Number-13: 978-1-4665-8209-5 Bhuyan, M.
In this study a detailed survey of IDS from the initial days, the development of IDS, architectures, components are presented. P., Computer Security Threat Monitoring and Surveillance, Technical report, James P.
In Advanced Computing and Intelligent Technologies (ICACIE), 2016 First International Conference on.
Mark Crosbie, Gene Spafford, Defending a Computer System using Autonomous Agents, Technical report No.
AINT misbehaving – A taxonomy of anti-intrusion techniques. of 18th NIST-NCSC National Information Systems Security Conference, pages 163–172, 1995. Ilgun, Koral, USTAT:a real time IDS for Unix, Proceedings of the 1993 IEEE Computer Society Symposium on research insecurity and privacy, 1993. Valdes, Next-generation intrusion detection expert system (NIDES), Technical report, SRI-CSL-95-07, SRI International, Computer Science Lab, May 1995." Paxson, Vern, Bro: A system for detecting network intruders in real-time, Computer Network, v 31, n 23, Dec 1999. S, Jajodia S, Modelling requests among cooperating IDSs, Computer Communications, v 23, n 17, Nov, 2000." J.
Intrusion Detection and Correlation: Challenges and Solutions.
95-022, COAST Laboratory, Department of Computer Sciences, Purdue University, March 1994.