The architecture of a network level intrusion detection system Inside internet security: What hackers don't want you to know. Pearson Education An overview of anomaly detection techniques: Existing solutions and latest technological trends Computer networks Kotsiantis, I. Zaharakis, and P. Pintelas, Supervised machine learning: A review of classification techniques Automatic network intrusion detection: Current techniques and open issues IDS Using Machine Learning -Current State of Art and Future Directions ADAM: Detecting intrusions by data mining, Proceedings of the IEEE Workshop on Information Assurance and Security, 2001. [9] D. Anderson, T. Frivold, and A. Valdes, Next-generation intrusion detection expert system (NIDES): A summary. SRI International, pp.3448-3470, 1990. ,
Correlation-based feature selection for machine learning, 1999. ,
A hybrid network intrusion detection technique using random forests, First International Conference on Availability, Reliability and Security (ARES'06), p.8, 2006. ,
DOI : 10.1109/ARES.2006.7
Anomaly Network Intrusion Detection Based on Improved Self Adaptive Bayesian Algorithm, Journal of Computers, vol.5, issue.1, pp.23-31, 2010. ,
DOI : 10.4304/jcp.5.1.23-31
Fuzzy data mining and genetic algorithms applied to intrusion detection, Proceedings of 12th Annual Canadian Information Technology Security Symposium, pp.109-122, 2000. ,
A novel intrusion detection system based on feature generation with visualization strategy, Expert Systems with Applications, vol.41, issue.9, pp.4139-4147, 2014. ,
DOI : 10.1016/j.eswa.2013.12.048
Ethem Alpaydin Introduction to Machine Learning (Adaptive Computation and Machine Learning Series), Natural Language Engineering, vol.14, issue.01, pp.133-137, 2004. ,
Analysis of KDD " 99 Intrusion detection dataset for selection of relevance features, Proceedings of the World Congress on Engineering and Computer Science, pp.20-22, 2010. ,
A Dynamic Intrusion Detection System Based on Multivariate Hotelling " s T 2 Statistics Approach for Network Environments, The Scientific World Journal, vol.2015, 2015. ,
Efficient classifier for R2L and U2R attacks, International Journal of Computer Applications, vol.45, issue.21, p.29, 2012. ,
Survey on incremental approaches for network anomaly detection, " arXiv preprint arXiv:1211, 1999. ,
Data mining approaches for intrusion detection, Usenix security, 1998. ,
Naive bayes classifiers, 2006. ,
Evaluating Various Learning Techniques for Efficiency, International Journal of Engineering and Advanced Technology (IJEAT), vol.2, issue.2, pp.326-331, 2012. ,
Induction of One-Level Decision Trees, Proceedings of the ninth international conference on machine learning, pp.233-240, 1992. ,
DOI : 10.1016/B978-1-55860-247-2.50035-8