References
[1]. Aleksandar Lazarevic et al. “Detection of Novel
Network Attacks Using Data Mining”
[2]. Animesh Patcha and Jung-Min Park. “An Overview of
Anomaly Detection Techniques: Existing Solutions and
Latest Technological Trends”.
[3]. Anshu Veda, Prajakta Kalekar and Anirudha
Bodhankar. “Intrusion Detection Using Data mining
Techniques”.
[4]. Asim Das and S.Siva Sathya. (2012). “Association Rule
Mining For KDD Intrusion Detection Data Set”. Presented in
International Journal of Computer Science and
Informatics ISSN (PRINT): 2231 –5292, Volume-2, Issue-3,
2012.
[5]. Bhavani Thuraisingham et. al. (2008). “Data Mining
for Security Applications” presented in 2008 IEEE/IFIP
International Conference on Embedded and Ubiquitous
Computing.
[6]. Dong Jianfeng. (2012). “The Application of Data
Mining Technology in Network Security Management”.
Presented in 2012 International Conference on Electrical
and Computer Engineering-Advances in Biomedical
Engineering, Vol.11
[7]. Eric Bloedorn, et. al. “Data Mining for Network
Intrusion Detection: How to Get Started"
[8]. Faeiz Alserhani et. al. “Snort Performance
Evaluation”.
[9]. Huy Anh Nguyen and Deokjai Choi. “Application of
Data Mining to Network Intrusion Detection: Classifier
Selection Model”.
[10]. Jiawei Han and Micheline Kamber. “Data Mining:
Concepts and Techniques”
[11]. John Galloway and Simeon J. Simoff. “Network Data
Mining: Methods and Techniques for Discovering Deep
Linkage between Attributes”.
[12]. Leonid Portnoy. “Intrusion Detection With Unlabeled
Data Using Clustering”.
[13]. Marcos M. Campos, Boriana L. Milenova. “Creation
and Deployment of Data Mining-Based Intrusion
Detection Systems in Oracle Database 10g”
[14]. Maricel Balitanas. (2008). “A Study on Integrating IDS
with Data Mining”. Presented in Journal of Security
Engineering
[15]. Min Qin and Kai Hwang. “Effectively Generating
Frequent Episode Rules for Anomaly-based Intrusion
Detection”.
[16]. Min Qin and Kai Hwang. “Frequent Episode Rules for
Intrusive Anomaly Detection with Internet Data mining”
[17]. Min-Feng Wang, Yen-Ching Wu, and Meng-Feng
Tsai. “Exploiting Frequent Episodes in Weighted Suffix Tree
to Improve Intrusion Detection System”.
[18]. Mrs. Sneha Kumari and Dr. Maneesh Shrivastava.
(2012). “A Study Paper on IDS Attack Classification Using
Various Data Mining Techniques”. International Journal of
Advanced Computer Research Vol. 2 No 3. Issue-5 .
[19]. P. Garci´a-Teodoro et. Al. (2009). “Anomaly-based
network intrusion detection: Techniques, systems and
challenges”. Computers & security ,28 I8 – 28.
[20]. Paul Dokas. “Data Mining for Network Intrusion
Detection”.
[21]. Qiang Wang and Vasileios Megalooikonomou. “A
Clustering Algorithm for Intrusion Detection”.
[22]. S Terry Brugger “Data Mining Methods for Network
Intrusion Detection”
[23]. Sarat M. Kocherlakota, Christopher G. Healey.
“Summarization Techniques for Visualization of Large
Multidimensional Datasets”.
[24]. Shashank Shanbhag and Tilman Wolf. “Evaluation of
an Online Parallel Anomaly Detection System”.
[25]. Theodoros Lappas and Konstantinos Pelechrinis.
“Data Mining Techniques for (Network) Intrusion Detection
Systems”.
[26]. U Aickelin, J Twycross and T Hesketh-Roberts. “Rule
Generalisation using Snort”.
[27]. Vikas Markam and Lect. Shirish Mohan Dubey.
(2012). “A General Study of Associations rule mining in
Intrusion Detection System”. Presented in International
Journal of Emerging Technology and Advanced
Engineering (ISSN 2250-2459, Vol. 2, Issue 1.
[28]. Wenke Lee et al. “Real Time Data Mining-based
Intrusion Detection”
[29]. Yogita B. Bhavsar and Kalyani C. Waghmare.
(2013). “Intrusion Detection System Using Data Mining
Technique: Support Vector Machine”. Presented in
International Journal of Emerging Technology and
Advanced Engineering (ISSN 2250-2459, ISO 9001:2008
Certified Journal, Vol. 3, Issue 3.
[30]. Pang - Ning, Michael- Steinbach, (2009).
“Introduction to Data Mining”, Pearson, 4th Ed.,.
[31]. G. K. Gupta, (2006). “Introduction to Data Mining
with Case Studies”, PHI.
[32]. http://www.sans.org/security-resources/idfaq/data_
mining.php
[33]. Http://en.wikipedia.org/wiki/Intrusion_detection_
system
[34]. Http://www.r-bloggers.com/data-mining-fornetwork-
security-and-intrusion-detection/