References
[1]. Chaker Katar, “Combining Multiple Techniques for
Intrusion Detection”, International Journal of Computer
Science and Network Security, Vol.6 No.2B, February
2006.
[2]. Dong Seong Kin, Ha Nam Ngugen, Jong Sou Park,
“Genetic Algorithm to improve SVM based Network
Intrusion Detection System”, Advanced information
Networking and Application, Vol.2, Pg.155-158, March
28-30, 2005.
[4]. Geer D. “Behavior based Network Security goes
mainstream”, IEEE Computer Society, Vol 39, issue 3,
Pg. 14-17, March 2006.
[5]. Huaizhi Li, Mukesh Singhal, “Trust Management in
Distributed System”, IEEE Computer Society, Vol 40, issue
2, Pg. 45-53, Feb. 2007.
[6]. Huntley C. L. “A developmental view of System
security”, IEEE Computer Society, Vol 39, issue 1,
Pg 113-114, Jan 2006.
[7]. Kemmerer R. A., Vigna G., “Hi DRA: Intrusion Detection
for internet Security”, Proceedings of the IEEE, Vol. 93,
issue 10, Pg. 1848-1857, Oct. 2005.
[8]. Kemmerer R. A., Vigna G., “Intrusion detection: a brief
history and overview”, IEEE Computer Society, Vol. 35,issue 4, Pg. 27-30, April 2002.
[9]. Leckie T., Yasinsac A., “Metadata for Anomaly based
Security Protocol attack Detection”, IEEE Transaction on
Knowledge and Data Engineering, Vol. 16, issue 9,
Pg. 1157-1168, Sept. 2004.
[10]. Nong Ye, Farley T., “A Scientific approach to cyber
attack detection”, IEEE Computer Society, Vol. 38, issue
11, Pg. 55-61, Nov. 2005.
[11]. Sang Long Pao T., Po Wei Wang, “Net flow based
Intrusion Detection System”, IEEE international
Conference on Networking sensing & Control, Vol.2,
Pg. 731-736, 2004.
[12]. Sang Jun Han, Sung Bae Cho, “Evolutionary neural
network for anomaly detection based on the behaviour
of a program”, IEEE Transaction on Systems, Man and
Cybernetics, Part B, Vol. 36, issue 3, Pg. 559-570, June
2006.
[13]. Vijairagavan V., Shah D., Galgali P., Shah
D. Srinivasan V., Bhatia L., “Marking Technique to isolate
boundary router and attacker”, IEEE Computer Society,
Vol. 40, issue 2, Pg. 54-58, Feb. 2007.
[14]. Ying Dar Lin, Chih Wei Jan, Po Ching Lin, Yuan
Cheng Lai, “Designing an integrated Architecture for
Network Content Security Gateways”, IEEE Computer
Society, Vol. 39, issue 11, Pg. 66-72, Nov. 2006.
[15]. Yu F. Laksman T.V., Motoyarna M. A., Kata R. H.,
“Efficient Multi match Packet classification for Network
Security Application”, IEEE Journal on Selected areas in
Communications, Vol. 24, issue 10, Pg. 1805-1816, Oct.
2006.