References
- P. Nagarajan, G. Perumal, "A Neuro Fuzzy Based Intrusion Detection System for a Cloud Data Center Using Adaptive Learning," The Journal of Institute of Information and Communication Technologies of Bulgarian Academy of Sciences, vol. 15, no. 3, pp. 88-103, 2015.
- B. Mukherjee, L. T. Heberlein, Karl N. Levitt "Network intrusion detection," IEEE Network, May/June: pp. 26-41, 1994.
- J. McHugh, "Intrusion and intrusion detection," International Journal of Information Security, vol. 1, no. 1, pp. 14-35, 2001. https://doi.org/10.1007/s102070100001
- E. H. Spafford, D. Zamboni, "Intrusion detection using autonomous agents," Computer Networks, Elsevier, vol. 34, no. 4, pp. 547-570, 2000. https://doi.org/10.1016/S1389-1286(00)00136-5
- S. Chebrolu, A. Abraham, J. P. Thomas, "Feature deduction and ensemble design of intrusion detection systems," Journal Computers and Security, Elsevier, vol. 24, no. 4, pp. 295-307. 2005. https://doi.org/10.1016/j.cose.2004.09.008
- C. Modi, D. Patel, H. Patel, B. Borisaniya, H. Patel, A. Patel, M. Rajarajan, "A survey of intrusion detection techniques in Cloud," Journal of Network and Computer Applications, Elsevier, vol. 36, no. 1, pp. 42-57, 2013. https://doi.org/10.1016/j.jnca.2012.05.003
- K. A. Scarfone, P. M. Mell, "Guide to Intrusion Detection and Prevention Systems (IDPS)," Recommendations of the National Institute of Standards and Technology, 2007.
- H. Debar, M. Dacier, A. Wespi "Towards a taxonomy of intrusion detection systems," Computer Networks, Elsevier, vol. 31, no. 8., pp. 805-822, 1999. https://doi.org/10.1016/S1389-1286(98)00017-6
- A. Lazarevic, V. Kumar, J. Srivastava , "Intrusion Detection: A Survey," Managing Cyber Threats-Issues, Approaches, and Challenges, Springer: pp. 19-80, 2005.
- W. Lee, S. Stolfo, K. Mok, "Adaptive Intrusion Detection: A Data Mining Approach," Artificial Intelligence Review , vol. 14, no. 6, pp. 533-567, 2000. https://doi.org/10.1023/A:1006624031083
- AK Jones, RS Sielken, "Computer system intrusion detection: A survey," University of Virginia. Technical Report, p. 25, 2000.
- J.P. Anderson, "Computer security threat monitoring and surveillance," James P. Anderson Co. Fort Washington, PA, 1980.
- D. E. Denning, "An Intrusion-Detection Model," IEEE Transactions on Software Engineering, IEEE, vol. 13, no. 2, 1986.
- T. F. Lunt, R. Jagannathan, R. Lee, S. Listgarten, D. L. Edwards, P. G. Neumann, et. al. "IDES: The enhanced prototype a real-time intrusion-detection expert system," Computer Science Laboratory SRI INTERNATIONAL, p. 88, 1988.
- G. Pang, K M. Ting, D. Albrecht, H. Jin., " ZERO++: Harnessing the Power of Zero Appearances to Detect Anomalies in Large-Scale Data Sets," Journal of Artificial Intelligence Research, vol. 57, pp. 593-620, 2016. https://doi.org/10.1613/jair.5228
- J. Z. Lei, A. Ghorbani, "Network intrusion detection using an improved competitive learning neural network," in Proc. of IEEE Proceedings Second Annual Conference on Communication Networks and Services Research, IEEE, pp. 190-197, 2004.
- F. Geramiraz, A.S. Memaripour, M. Abbaspour, "Adaptive anomaly-based intrusion detection system using fuzzy controller," International Journal of Network Security, vol. 14, no. 6, pp.352-361, 2012.
- T. Kohonen, "Essentials of the self-organizing map," Neural Networks, Elsevier, vol. 37, pp. 52-65, 2013. https://doi.org/10.1016/j.neunet.2012.09.018
- H. G. Kayacik, A. Zincir-Heywood, M. I. Heywood "A hierarchical SOM based intrusion detection system," Engineering Applications of Artificial Intelligence, Elsevier, vol. 20, no. 4, pp. 439-451, 2007. https://doi.org/10.1016/j.engappai.2006.09.005
- Y. Yang, D. Jiang, M. Xia, "Using improved GHSOM for intrusion detection," Journal of Information Assurance and Security, vol. 5, pp. 232-239, 2010.
- A. N. Toosi, M. Kahani, "A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers," Computer Communications, Elsevier, vol. 30, no. 10, pp. 2201-2212, 2007. https://doi.org/10.1016/j.comcom.2007.05.002
- B. Kavitha, S. Karthikeyan, P. S. Maybell "An ensemble design of intrusion detection system for handling uncertainty using Neutrosophic Logic Classifier," Knowledge-Based Systems, Elsevier, vol. 28, pp. 88-96, 2011.
- G. Wang, J. Hao, J. Ma, L. Huang "A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering," Expert Systems with Applications, Elsevier, vol. 37, no. 9, pp. 6225-6232, 2010. https://doi.org/10.1016/j.eswa.2010.02.102
- L. DeLooze, J. Kalita, "Applying soft computing techniques to intrusion detection," Cyber Security and Information Infrastructure Research Workshop, pp. 70-99, 2006.
- L. Dhanabal, S. P. Shantharajah "A study on NSL-KDD dataset for intrusion detection system based on classification algorithms," International Journal of Advanced Research in Computer and Communication Engineering, vol. 4, no. 6, pp. 446-552, 2015.
- M. Jazzar, A. Jantan "A novel soft computing inference engine model for intrusion detection", IJCSNS International Journal of Computer Science and Network Security, vol. 8, no. 4, pp. 1-9, 2008.
- M. Pandaa, A. Abraham, M. R. Patra "A hybrid intelligent approach for network intrusion detection," Procedia Engineering, Elsevier, vol. 30, pp. 1-9, 2012.
- R. A. R. Ashfaq, X. Wang , J. Z. Huang, H. Abbas , Y. L. He "Fuzziness based semi-supervised learning approach for intrusion detection system," Information Sciences, Elsevier, vol. 378, pp. 484-497, 2017. https://doi.org/10.1016/j.ins.2016.04.019
- S. Elhag, A. Fernandez, A. Bawakid, S. Alshomrani, F. Herrera "On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on Intrusion Detection Systems," Expert Systems with Applications, Elsevier, vol. 42, no.1, pp. 193-202, 2015. https://doi.org/10.1016/j.eswa.2014.08.002
- Z. Jian-Hua, LI Wei-Hua, "Intrusion detection based on improved SOM with optimized GA," JOURNAL OF COMPUTERS, vol. 8, no. 6, pp. 1456-1463, 2013.
- V. Venkatachalam, S.Selvan, "Intrusion detection using an improved competitive learning lamstar neural network," International Journal of Computer Science and Network Security, vol. 7, no. 2, pp. 255-26, 2007.
- P. Aggarwal, S. K. Sharma, "Analysis of KDD dataset attributes - class wise for intrusion detection," in Proc. of 3rd International Conference on Recent Trends in Computing 2015 Procedia Computer Science, Elsevier, vol. 57, pp. 842-851, 2015.
- P. Lichodzijewski, A. Nur Zincir-Heywood, M. I. Heywood, "Host-based intrusion detection using Self-Organizing Maps," in Proc. of IJCNN '02. Proceedings of the International Joint Conference on Neural Networks, IEEE, vol. 2, pp. 1714-1719, 2002.
- A. Midzic, Z. Avdagic and S. Omanovic, "Intrusion detection system modeling based on neural networks and fuzzy logic," in Proc. of 2016 IEEE 20th Jubilee International Conference on Intelligent Engineering Systems (INES), IEEE, pp. 189-194, 2016.
- I. Levin, "KDD-99 Classifier Learning Contest LLSoft's Results Overview," SIGKDD Explorations, vol. 1, no. 2, pp. 67-75, 2000. https://doi.org/10.1145/846183.846201
- Z. Avdagic, A. Midzic, "The effects of combined application of SOM, ANFIS and Subtractive Clustering in detecting intrusions in computer networks," MIPRO 2014, IEEE,. pp. 1582-1587., 2014.
- NSL KDD Dataset [Internet]:
- J. McHugh, "Recent Advances in Intrusion Detection. RAID 2000. Lecture Notes in Computer Science," Springer, Berlin, pp. 145-161, 2000.
- S. Revathi, A. Malathi "A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection," International Journal of Engineering Research & Technology (IJERT) 2(12):pp. 1848-1853. 2013.
- S. Duque, M. N. Omar. "Using Data Mining Algorithms for Developing a Model for Intrusion Detection System (IDS)," Procedia Computer Science, Elsevier, vol. 61, pp. 46-51, 2015. https://doi.org/10.1016/j.procs.2015.09.145
- J. Lee, D. Park and C. Lee, "Feature Selection Algorithm for Intrusions Detection System using Sequential Forward Search and Random Forest Classifier," KSII Transactions on Internet and Information systems, vol. 11, no. 10, pp.5132-5148, 2017. https://doi.org/10.3837/tiis.2017.10.024
- N. V. Chawla, K. W. Bowyer, L. O., W. P. Kegelmeyer. "SMOTE: Synthetic Minority Over-sampling Technique," Journal of Artificial Intelligence Research, vol. 16, pp. 321-357 2002. https://doi.org/10.1613/jair.953
- J. Vesanto, E. Alhoniemi, "Clustering of the Self Organizing Map," IEEE Transactions on Neural Networks, IEEE, vol. 11, no. 3, pp. 556 - 500, 2000
- G. M. Weiss, F. Provost "Learning When Training Data are Costly: The Effect of Class Distribution on Tree Induction," Journal of Artificial Intelligence Research, vol. 19, pp. 315-354, 2003. https://doi.org/10.1613/jair.1199