@incollection{, 57382126D9D6EEBC39A814651E4C00B0 , author={{AdamuTeshome} and {Dr.Vuda SreenivasaRao} and {Bahir Dar University}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}14618 } @incollection{b0, , title={{D-SCIDS: Distributed soft computing intrusion detection system}} , author={{ RAbraham } and { JJain } and { Thomas }} , journal={{Journal of Network and Computer Applications}} 30 , year={2007} } @incollection{b1, , title={{Cyber Security and the Evolution of Intrusion Detection Systems}} , author={{ GAjith } and { CCrina } and { Yuehui }} , journal={{Information Management and Computer Security}} 9 4 , year={2001} } @incollection{b2, , title={{Intrusion Detection in Computer Networks based on Machine Learning Algorithms}} , author={{ BitashadgarAlirezaosareh }} , journal={{IJCSNS International Journal of Computer Science and Network Security}} 8 11 , year={2008} } @incollection{b3, , title={{Test-Cost Sensitive Naïve Bayesian Classification}} , author={{ XChai } and { LDeng } and { QYang } and { CXLing }} , booktitle={{Proceedings of the Fourth IEEE International Conference on Data Mining}} the Fourth IEEE International Conference on Data MiningBrighton, UK , publisher={IEEE Computer Society Press} , year={2004} } @incollection{b4, , title={{An Intrusion Detection Model}} , author={{ DEDenning }} , journal={{IEEE Trans-actions on Software Engineering, SE}} 13 , year={1987} } @incollection{b5, , title={{A general method for making classifiers cost-sensitive}} , author={{ PDomingos } and { Metacost }} , booktitle={{Proceedings of the Fifth International Conference on Knowledge Discovery and Data Mining}} the Fifth International Conference on Knowledge Discovery and Data Mining , publisher={ACM Press} , year={1999} } @incollection{b6, , title={{Exploiting the cost (in) sensitivity of decision tree splitting the criteria}} , author={{ CDrummond } and { RHolte }} , booktitle={{Proceedings of the 17 International Conference on Machine Learning}} the 17 International Conference on Machine Learning , year={2000} } @book{b7, , title={{Data Mining for Network Intrusion Detection: How to Get Started}} , author={{ EBloedorn }} , year={August 2001} , note={MITRE Technical Report} } @incollection{b8, , title={{Elkan, C. The Foundations of Cost-Sensitive Learning}} , booktitle={{Proceedings of the Seventeenth International Joint Conference of Artificial Intelligence}} the Seventeenth International Joint Conference of Artificial IntelligenceSeattle, Washington , year={1999. 2001} , note={ElkanC Results of the KDD'99 Classifier Learning Contest} } @book{b9, , title={{Integrating Fuzzy Logic With Data Mining Methods for Intrusion Detection}} , author={{ JLuo }} , year={1999} Department of Computer Science, Mississippi State University , note={Master's thesis} } @incollection{b10, , title={{Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory}} , author={{ JMchugh }} , journal={{ACM Transactions on Information and System Security}} 3 4 , year={2000} } @book{b11, , title={{Computer Security Threat Monitoring and Surveillance}} , author={{ JPAnderson }} , year={April 1980} , publisher={Anderson Co} , address={Fort Washington, Pennsylvania} , note={Technicalreport} } @incollection{b12, , title={{Intrusion detection: methods and systems}} , author={{ Joseph } and { Rod }} , journal={{Information Management and Computer Security}} 11 5 , year={2003} } @book{b13, , title={{KDD CUP 1999 Data. The UCI KDD Archive Information and Computer Science}} University of California,Irvine } @book{b14, , title={{The MINDS -Minnesota intrusion detection system, next generation data mining}} , author={{ LErtoz } and { EEilerson } and { ALazareviv }} , year={2004} , publisher={MIT Press} } @incollection{b15, , title={{A Method To Detect Intrusive Activity in a Networked Environment}} , author={{ LTHeberlein } and { KNLevitt } and { BMukherjee }} , booktitle={{Proceedings of the 14th National Computer Security Conference}} the 14th National Computer Security Conference , year={october 1991} } @incollection{b16, , title={{A Framework for constructing features and models for intrusion detection systems}} , author={{ WLee } and { SJStolfo }} , journal={{ACM TransInfSystSecurity}} , year={2000} } @book{b17, , author={{ MTavallaee } and { EBagheri } and { WLu } and { AGhorbani }} , title={{A Detailed Analysis of the KDD CUP 99 Data Set, IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA)}} , year={2009} } @incollection{b18, , title={{Jaideep Srivastava, Pang-Ning Tan, Data Mining for Network Intrusion Detection}} , booktitle={{Nsl-kdd data set for network-based intrusion detection Systems. Available on}} LeventErtoz, Vipin Kumar, AleksandarLazarevic , publisher={Paul Dokas} , year={March, 2010. 22. 2001} University of Minnesota } @incollection{b19, , title={{Machine learning from imbalanced data sets 101}} , author={{ FProvost }} , booktitle={{Proceedings of the AAAI'2000 Workshop on Imbalanced Data}} the AAAI'2000 Workshop on Imbalanced Data , year={2000} } @book{b20, , title={{The Architecture of a Network Level Intrusion Detection System}} , author={{ RHeady } and { GLuger } and { AMaccabe } and { MServilla }} , year={August 1990} Department of Computer Science, University of New Mexico , note={Technical report} } @book{b21, , title={{The Architecture of a Network Level Intrusion Detection System}} , author={{ RHeady } and { GLuger } and { AMaccabe } and { MServilla }} , year={August 1990} Department of Computer Science, University of New Mexico , note={Technical report} } @incollection{b22, , title={{Adaptive Framework for Network Intrusion Detection by Using Genetic-Based Machine Learning Algorithm}} , author={{ SWafa } and { ReyadhshAl-Sharafat } and { Naoum }} , journal={{IJCS-NS International Journal of Computer Science and Network Security}} 9 4 , year={April 2009} } @incollection{b23, , title={{Genetic Algorithm for framing rules for intrusion Detection}} , author={{ SSelvakani } and { RSRajesh }} , journal={{IJCSNS International Journal of Computer Science and Network Security}} 7 11 , year={November 2007} } @incollection{b24, , title={{Thresholding for Making Classifiers Cost-sensitive}} , author={{ VSSheng } and { CXLing }} , booktitle={{Proceedings of the 21National Conference on Artificial Intelligence}} the 21National Conference on Artificial IntelligenceBoston, Massachusetts , year={2006} } @book{b25, , title={{Practical Security, O'Reilly and Associates}} , author={{ GeneSimsongarfinkel } and { Spafford }} , year={1991} , address={Sebastopol, California} } @book{b26, , title={{Data Mining Methods for Network Intrusion Detection}} , author={{ Sterrybrugger }} , year={June 2004} University of California } @incollection{b27, , title={{Types of cost in inductive concept learning}} , author={{ PDTurney }} , booktitle={{Proceedings of the Workshop on Cost-Sensitive Learning at the Seventeenth International Conference on Machine Learning}} the Workshop on Cost-Sensitive Learning at the Seventeenth International Conference on Machine LearningCalifornia , year={2000} Stanford University } @incollection{b28, , title={{Cost-Sensitive Classification: Empirical Evaluation of a Hybrid Genetic Decision Tree Induction Algorithm}} , author={{ PDTurney }} , journal={{Journal of Artificial Intelligence Research}} 2 , year={1995} } @incollection{b29, , title={{Learning and Making Decisions When Costs and Probabilities are Both Unknown}} , author={{ BZadrozny } and { CElkan }} , booktitle={{Proceedings of the Seventh International Conference on Knowledge Discovery and Data Mining}} the Seventh International Conference on Knowledge Discovery and Data Mining , year={2001} } @book{b30, , title={{Costsensitive learning by Cost-Proportionate instance}} , author={{ BZadrozny } and { JLangford } and { Abe } and { N }} }