A. Ajboye, Anomaly Detection in Dataset for Improved Model Accuracy Using DBSCAN Clustering Algorithm, pp.39-46, 2015.

E. Al-shaer and H. Hamed, Firewall policy advisor for anomaly detection and rules, International Symposium on Integrated Network Management, pp.17-30, 2003.
DOI : 10.1109/inm.2003.1194157

J. C. Bezdek, R. J. Et, and . Hathaway, VAT: a tool for visual assessment of (cluster) tendency, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290), pp.2225-2230, 2002.
DOI : 10.1109/IJCNN.2002.1007487

E. Bognar, Data mining in cyber threat analysis neural networks for intrusion detection, pp.187-197, 2016.

R. Breunig, An almost unbiased estimator of the coefficient of variation, Economics Letters, vol.70, issue.1, pp.15-19, 2001.
DOI : 10.1016/S0165-1765(00)00351-7

. Cisco, Snort. https://www, 2017.

D. Pierrot, N. Harbi, and J. D. , Hybrid Intrusion Detection in Information Systems, 2016 International Conference on Information Science and Security (ICISS), pp.27-32, 2016.
DOI : 10.1109/ICISSEC.2016.7885857

URL : https://hal.archives-ouvertes.fr/hal-01380026

A. J. Deepa and V. Kavitha, A comprehenseive survey on approaches to intrusion detection system, International Conference on Modelling Optimization and Computing, vol.38, pp.2063-2069, 2012.

Z. Elkhadir, Intrusion Detection System Using PCA and Kernel PCA Methods, International Journal of Computer Science, vol.13, issue.2, pp.72-79, 2016.
DOI : 10.1162/089976698300017467

E. Bahri and N. H. , Real detection intrusion using supervised and unsupervised learning, pp.321-326, 2013.

L. M. Garcia, TCPdump and Libpcap, 2017.

M. Ghoniem, VAFLE: Visual Analytics of Firewall Log Events, Visualization and Data Analysis, 2014.

M. Gupta, Intrusion Detection Using Decision Tree Based Data Mining Technique, International Journal for Research in Applied Science and Engineering Technology, vol.4, pp.24-28, 2016.

H. Rais and T. Mehmood, Dynamic ant colony system with three level update feature selection for intrusion detection, injs, Journal of Network Security, vol.20, pp.184-192, 2018.

F. Lamiaa and H. Manal, Using Modified Partitioning Around Medoids Clustering Technique in Mobile Network Planning, Décision sur les intrusions, pp.10-25, 2013.

W. Lee, A data mining framework for building intrusion detection model, IEEE Symposium on Security and Privacy, pp.120-132, 1999.

K. Levenberg, A method for the solution of certain problems in least squares, 1944.

D. Marquardt, An Algorithm for Least-Squares Estimation of Nonlinear Parameters, Journal of the Society for Industrial and Applied Mathematics, vol.11, issue.2, 1963.
DOI : 10.1137/0111030

R. Marty, AfterGlow, 2013.

S. Meesala, B. Et, and . Xavier, A Hybrid Intrusion Detection System Based on C5.0 Decision Tree and One-Class SVM, International Journal of Current Engineering and Technology, vol.5, pp.59-70, 2015.

S. Meghana and V. Dhamdhere, Hybrid approach for Intrusion Detection Using Data Mining, International Journal of Innovative Research in Science, Engineering and Technology, vol.4, pp.5588-5595, 2015.

H. Nguyen, An efficient local region and clustering-based ensemble system for intrusion detection, Proceedings of the 15th Symposium on International Database Engineering & Applications, IDEAS '11, pp.185-191, 2011.
DOI : 10.1145/2076623.2076647

URL : https://hal.archives-ouvertes.fr/hal-00631503

S. Sunita, A Hybrid approach of Intrusion Detection using ANN and FCM, European Journal Advances in Engineering and Technology, vol.3, pp.6-14, 2016.

S. Tanpure, Intrusion detection system in data mining using hybrid approach, National Conference on Advances in Computing, Communication and Networking, pp.18-21, 1999.

S. Yadav, D. Et, and . Mallari, Technical Aspects of Cyber Kill Chain, Communications in Computer and Information Science, vol.536, pp.438-452, 2016.
DOI : 10.1007/978-3-319-22915-7_40

E. Zambon, D. Et, and . Bolzoni, Network intrusion detection systems, 2006.