@incollection{, A610D59739E5458579D3D5F5C6BE9060 , author={{MohsenKakavand}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1452331 } @incollection{b0, , title={{Enhancing one-class support vector machines for unsupervised anomaly detection}} , author={{ MAmer } and { MGoldstein } and { SAbdennadher }} doi:10.1145 /2500853.2500857 , booktitle={{Proceedings of the ACM SIGKDD Workshop on Outlier Detection and Description-ODD '13}} the ACM SIGKDD Workshop on Outlier Detection and Description-ODD '13 , year={2013} } @book{b1, , title={{Computer Security Threat Monitoring And Surveillance}} , author={{ JPAnderson }} , year={1980} } @book{b2, , title={{}} , author={{ Washington }} } @book{b3, , title={{Text Mining with MATLAB®}} , author={{ REBanchs }} 10.1007/978-1-4614-4151-9 , year={2013} , publisher={Springer} , address={New York, NY; New York} } @incollection{b4, , title={{Discovering fuzzy association rule patterns and increasing sensitivity analysis of XML-related attacks}} , author={{ G.-YChan } and { C.-SLee } and { S.-HHeng }} , journal={{Journal of Network and Computer Applications}} 3 , year={2013} , publisher={Elsevier Science} } @book{b5, , title={{Vulnerability Type Distributions in CVE. MITRE, Common Weakness Enumeration (CWETM)}} , author={{ ASChristey } and { RAMartin }} , year={2007. May 22, 2007} , note={Retrieved} } @book{b6, , author={{ GDavide } and { TBrian }} , title={{United States of America: Publisher: O'Reilly Media}} 617 , note={HTTP The Definitive Guide} } @incollection{b7, , title={{Data preprocessing for anomaly based network intrusion detection: A review}} , author={{ JJDavis } and { AJClark }} 10.1016/j.cose.2011.05.008 , journal={{Computers & Security}} 30 6-7 , year={2011} } @incollection{b8, , title={{A hybrid network intrusion detection framework based on random forests and weighted k-means}} , author={{ RMElbasiony } and { EASallam } and { TEEltobely } and { MMFahmy }} 10.1016/j.asej.2013.01.003 , journal={{Ain Shams Engineering Journal}} 4 4 , year={2013} } @incollection{b9, , title={{Measuring normality in HTTP traffic for anomaly-based intrusion detection}} , author={{ JMEstévez-Tapiador } and { PGarc?á-Teodoro } and { JED?áz-Verdejo }} 10.1016/j.comnet.2003.12.016 , journal={{Computer Networks}} 45 2 , year={2004} , publisher={Elsevier} } @incollection{b10, , title={{SensorWebIDS: a web mining intrusion detection system}} , author={{ CIEzeife } and { JDong } and { AKAggarwal }} 10.1108/17440080810865648 , journal={{International Journal of Web Information Systems}} 4 1 , year={2008} , publisher={Emerald} } @incollection{b11, , title={{Selecting the Best Set of Features for Efficient Intrusion Detection in 802 . 11 Networks}} , author={{ MGuennoun } and { ALbekkouri } and { KEl-Khatib }} , booktitle={{in:Information and communication technologies: from theory to applications, ICTTA 2008. 3rd International Conference}} , year={2008} } @incollection{b12, , title={{A Brief Survey of Text Mining}} , author={{ AHotho } and { NAndreas } and { GPaaß } and { SAugustin }} , journal={{LDV Forum -GLDV Journal for Computational Linguistics and Language Technology}} , year={2005} } @book{b13, , author={{ IanHWitten } and { MA HFrank }} , title={{Data Mining Practical Machine Learning Tools and Techniques}} , year={2011} 40 } @book{b14, , title={{}} 10.1002/15213773(20010316)40:<923 AID-ANIE9823>3.3 , publisher={Elsevier} 2 } @book{b15, , author={{ JiaweiHan } and { MichelineKamber }} , title={{Data Mining: Concepts and Techniques}} San Francisco, CA, USA , publisher={Morgan Kaufmann} , year={2011} } @incollection{b16, , title={{Intrusion Detection System with Data Mining Approach: A Review}} , author={{ MKhalilian } and { NMustapha } and { NSulaiman } and { AMamat }} , journal={{Global Journal Of Computer Science & Technology}} 5 11 , year={2011} } @incollection{b17, , title={{A multi-model approach to the detection of webbased attacks}} , author={{ CKruegel } and { GVigna } and { WRobertson }} 10.1016/j.comnet.-2005.01.009 , journal={{Computer Networks}} 48 5 , year={2005} , publisher={Elsevier Science} } @book{b18, , title={{Text Categorization with Support Vector Machines .How to Represent Texts in Input Space ?}} , author={{ ELeopold } and { JKindermann }} , year={2002} , publisher={Kluwer Academic Publishers Machine Learning} } @incollection{b19, , title={{PHAD : Packet Header Anomaly Detection for Identifying Hostile Network Traffic}} , author={{ MVMahoney } and { PKChan }} , journal={{Florida Institute of Technology Technical Report}} , year={2001. 1998} } @incollection{b20, , title={{Data mining techniques for security of web services}} , author={{ M;Malek } and { FHarmantzis }} , booktitle={{Proc. International Conference on E-Business and Telecommunication Networks (ICETE)}} International Conference on E-Business and Telecommunication Networks (ICETE) , year={2004} } @incollection{b21, , title={{McPAD : A Multiple Classifier System for Accurate Payload-based Anomaly Detection}} , author={{ RPerdisci } and { DAriu } and { PFogla } and { GGiacinto } and { WLee }} , journal={{Computer Networks}} 5 6 , year={2009} , publisher={Elsevier Science} } @incollection{b22, , title={{Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks}} , author={{ WRobertson } and { GVigna } and { CKruegel } and { RAKemmerer }} , booktitle={{Proceedings of the Network and Distributed System Security Symposium (NDSS)}} the Network and Distributed System Security Symposium (NDSS) , year={2006} 14 } @book{b23, , title={{}} , author={{ BScholkopf } and { KSung } and { CBurges } and { FGirosi } and { PNiyogi } and { TPoggio } and { VVapnik }} , year={1996} } @incollection{b24, , title={{Comparing Support Vector Machines with Gaussian Kernels to Radial Basis Function Classifiers}} 10.1109/78.650102 , journal={{IEEE Transactions on Signal Processing}} , year={1996-12-01} } @incollection{b25, , title={{Machine learning in automated text categorization}} , author={{ FSebastiani }} 10.1145/505282.505283 , journal={{ACM Computing Surveys}} 34 1 , year={2002} } @incollection{b26, , title={{Toward developing a systematic approach to generate benchmark datasets for intrusion detection}} , author={{ AShiravi } and { HShiravi } and { MTavallaee } and { AGhorbani }} 10.1016/j.cose.2011.12.012 , journal={{Computers & Security}} 31 3 , year={2012} , publisher={Elsevier} } @incollection{b27, , title={{Practical automated detection of stealthy portscans}} , author={{ SStaniford } and { JAHoagland } and { JMMcalerney }} , journal={{Journal of Computer Security}} 10 , year={2002} } @incollection{b28, , title={{Anomalous Payload-based Network Intrusion Detection}} , author={{ KWang } and { SJStolfo }} RAID , booktitle={{7th International Symposium}} Berlin Heidelberg; Sophia Antipolis, France , publisher={Springer} , year={2004. September 15 -17} } @incollection{b29, , title={{Applications of HMM in Protocol Anomaly Detection}} , author={{ JZhao } and { HHuang } and { STian } and { XZhao }} 10.1109/CSO.2009.51 , booktitle={{2009 International Joint Conference on Computational Sciences and Optimization}} , publisher={Ieee} , year={2009} }