@incollection{, 6216DDE5067C05A298542894511A351E , author={{V.Jyothsn} and {JNTUH}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1474350 } @book{b0, , title={{A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems}} , author={{ KKendall }} , year={1998} Massachusetts Institute of Technology , note={Master's Thesis} } @incollection{b1, , title={{A Review of Anomaly based Intrusion Detection Systems}} , author={{ VJyothsna } and { VVRama Prasad }} , journal={{International Journal of Computer Applications}} 28 7 , year={August 2011} } @incollection{b2, , title={{A Revised taxonomy for intrusion detection systems}} , author={{ HDebar } and { MDacier } and { AWespi }} , journal={{Annales des Telecommunications}} 55 7-8 , year={2000} } @incollection{b3, , title={{A Comparative Study of Techniques for Intrusion Detection}} , author={{ SMukkamala } and { Sung }} , booktitle={{Proceedings of 15th IEEE International Conference on Tools with Artificial Intelligence}} 15th IEEE International Conference on Tools with Artificial Intelligence , publisher={IEEE Computer Society Press} , year={2003} } @book{b4, , title={{Anomaly-based network intrusion detection: Techniques, systems and challenges}} , author={{ PGarcía-Teodoro } and { JDíaz-Verdejo } and { GMaciá-Fernández } and { EVázquez }} , year={March 2009} , publisher={Elsevier Computers & Security} 28 } @incollection{b5, , title={{Adaptive Intrusion Detection Based on Machine Learning: Feature Extraction, Classifier Construction and Sequential Pattern Prediction}} , author={{ XinXu }} , journal={{International Journal of Web Services Practices}} 2 1 , year={2006} } @incollection{b6, , title={{An Introduction to Variable and Feature Selection}} , author={{ IsabelleGuyon } and { AndreElisseeff }} , journal={{Journal of Machine Learning Research}} , year={March 2003} } @incollection{b7, , title={{The Feature Selection and Intrusion Detection Problems}} , author={{ HSung } and { SMukkamala }} , booktitle={{Proceedings of the 9th Asian Computing Science Conference}} , booktitle={{Lecture Notes in Computer Science}} the 9th Asian Computing Science Conference , publisher={Springer} , year={2004} } @incollection{b8, , title={{Features selection for intrusion detection systems based on support vector machines}} , author={{ SZaman } and { Karray }} , booktitle={{CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference}} , year={2009} } @incollection{b9, , title={{Feature deduction and ensemble design of intrusion detection systems}} , author={{ SChebrolu } and { JPAbraham } and { Thomas }} , journal={{Computers & Security}} 24 4 , year={June 2005} } @incollection{b10, , title={{Network Intrusion Detection Design Using Feature Selection of Soft Computing Paradigms}} , author={{ TSChou } and { KKYen } and { JLuo }} , journal={{International Journal of Computational Intelligence}} , year={2008} } @incollection{b11, , title={{Improving Effectiveness of Intrusion Detection by Correlation Feature Selection}} , author={{ HNguyen } and { Franke } and { Petrovic }} , booktitle={{International Conference on Availability, Reliability and Security}} 2010 } @book{b12, , title={{Correlation-based Feature Selection for Machine Learning}} , author={{ MarkAHall }} Dept of Computer Science, University of Waikato } @book{b13, , title={{Using Information Gain Attribute Evaluation to Classify Sonar Targets}} , author={{ JasminaNovakovic }} , year={November 24-26, 2009} , address={Belgrade} , note={17th Telecommunications forum TELFOR 2009 Serbia} } @incollection{b14, , title={{Feature Selection based on Information Gain}} , author={{ BAzhagusundari } and { AntonySelvadossThanamani }} , journal={{International Journal of Innovative Technology and Exploring Engineering (IJITEE)}} 2278-3075 2 , year={January 2013} } @incollection{b15, , title={{Bayesian classification model for Real time intrusion detection}} , author={{ RPuttini } and { Z } and { LMe }} , booktitle={{Proc. of 22nd. International workshop on Bayesian inference and maximum entropy methods in science and engineering}} of 22nd. International workshop on Bayesian inference and maximum entropy methods in science and engineering , year={2002} } @incollection{b16, , title={{Basesian based intrusion detection system}} , author={{ HeshamAltwaijry } and { SaeedAlgarny }} , journal={{Journal of King Saud University -Computer and Information Sciences}} , year={2012} } @incollection{b17, , title={{Adaptive network intrusion detection method based on PCA and support vector machines}} , author={{ XinXu } and { XNWang }} , booktitle={{ADMA 2005}} , booktitle={{Lecture Notes in Artificial Intelligence}} , year={2005} 3584 , note={LNAI} } @book{b18, , title={{A tutorial on Principal Components Analysis}} , author={{ ILindsay } and { Smith }} , year={February 26, 2002} } @incollection{b19, , title={{Feature Subset Selection for Network Intrusion Detection Mechanism Using Genetic Eigen Vectors}} , author={{ Ahmad } and { AAbdulah } and { KS Alghamdi } and { MAlnfajan } and { Hussain }} , booktitle={{Proc .of CSIT}} .of CSIT , year={2011} 5 } @book{b20, , author={{ JiaweiHan } and { MichelineKamber }} , title={{Data mining: Concepts and Techniques}} , publisher={Morgan Kauffmann Publishers} , year={2006} } @incollection{b21, , title={{HFO-ANID: Hierarchical Feature Optimization for Anomaly based Network Intrusion Detection}} , author={{ VJyothsna } and { VVRama Prasad }} , booktitle={{Third International Conference on Computing Communication & Networking Technologies (ICCCNT)}} , year={July 2012} , note={Published in IEEE Xplore digital library} } @incollection{b22, , title={{A detailed analysis of the KDD Cup datasets}} , author={{ MTavallaee } and { EBagheri } and { LuWGhorbani } and { AA }} , booktitle={{proceedings of IEEE Symposium on computational intelligence in security and defence applications}} IEEE Symposium on computational intelligence in security and defence applications , year={2009} } @incollection{b23, , title={{Identify Features and Parameters to Devise an Accurate Intrusion Detection System Using Artificial Neural Network}} , author={{ MSaman } and { Abdulla } and { BNajla } and { OmarAl-Dabagh } and { Zakaria }} , journal={{World Academy of Science, Engineering and Technology}} , year={2010} } @book{b24, , title={{Intrusion Detection using Naive Bayes Classifier with Feature Reduction}} , author={{ Dr } and { NeelamSaurabh Mukherjeea } and { Sharmaa }} , year={2012} , publisher={Elsevier Procedia Technology} } @book{b25, , title={{NSL-KDD dataset for network -based intrusion detection systems}} }