J. M. Kizza, R. Heady, G. F. Luger, A. Maccabe, M. Servilla et al., The architecture of a network level intrusion detection system Inside internet security: What hackers don't want you to know. Pearson Education An overview of anomaly detection techniques: Existing solutions and latest technological trends Computer networks Kotsiantis, I. Zaharakis, and P. Pintelas, Supervised machine learning: A review of classification techniques Automatic network intrusion detection: Current techniques and open issues IDS Using Machine Learning -Current State of Art and Future Directions ADAM: Detecting intrusions by data mining, Proceedings of the IEEE Workshop on Information Assurance and Security, 2001. [9] D. Anderson, T. Frivold, and A. Valdes, Next-generation intrusion detection expert system (NIDES): A summary. SRI International, pp.3448-3470, 1990.

M. A. Hall, Correlation-based feature selection for machine learning, 1999.

J. Zhang and M. Zulkernine, A hybrid network intrusion detection technique using random forests, First International Conference on Availability, Reliability and Security (ARES'06), p.8, 2006.
DOI : 10.1109/ARES.2006.7

D. M. Farid and M. Z. Rahman, Anomaly Network Intrusion Detection Based on Improved Self Adaptive Bayesian Algorithm, Journal of Computers, vol.5, issue.1, pp.23-31, 2010.
DOI : 10.4304/jcp.5.1.23-31

S. M. Bridges and R. B. Vaughn, Fuzzy data mining and genetic algorithms applied to intrusion detection, Proceedings of 12th Annual Canadian Information Technology Security Symposium, pp.109-122, 2000.

B. Luo and J. Xia, A novel intrusion detection system based on feature generation with visualization strategy, Expert Systems with Applications, vol.41, issue.9, pp.4139-4147, 2014.
DOI : 10.1016/j.eswa.2013.12.048

S. Khan, Ethem Alpaydin Introduction to Machine Learning (Adaptive Computation and Machine Learning Series), Natural Language Engineering, vol.14, issue.01, pp.133-137, 2004.

A. A. Olusola, A. S. Oladele, and D. O. Abosede, Analysis of KDD " 99 Intrusion detection dataset for selection of relevance features, Proceedings of the World Congress on Engineering and Computer Science, pp.20-22, 2010.

A. , A. Sivasamy, and B. Sundan, A Dynamic Intrusion Detection System Based on Multivariate Hotelling " s T 2 Statistics Approach for Network Environments, The Scientific World Journal, vol.2015, 2015.

P. G. Jeya, M. Ravichandran, and C. S. Ravichandran, Efficient classifier for R2L and U2R attacks, International Journal of Computer Applications, vol.45, issue.21, p.29, 2012.

M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, Survey on incremental approaches for network anomaly detection, " arXiv preprint arXiv:1211, 1999.

W. Lee and S. J. Stolfo, Data mining approaches for intrusion detection, Usenix security, 1998.

K. P. Murphy, Naive bayes classifiers, 2006.

M. Khan and S. M. Quadri, Evaluating Various Learning Techniques for Efficiency, International Journal of Engineering and Advanced Technology (IJEAT), vol.2, issue.2, pp.326-331, 2012.

W. Iba and P. Langley, Induction of One-Level Decision Trees, Proceedings of the ninth international conference on machine learning, pp.233-240, 1992.
DOI : 10.1016/B978-1-55860-247-2.50035-8