@incollection{, BD05B8E2AD632D96E90AF2FE271C85E8 , author={{Gagan DeepSharma} and {VivekKumar} and {GGSIP University}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}164110 } @incollection{b0, , title={{Computer Security Technology Planning Study Volume II}} , author={{ JPAnderson }} , booktitle={{Electronic Systems Division (AFSC)}} , year={1972} } @book{b1, , title={{NIST special publication on intrusion detection systems}} , author={{ RBace } and { PMell }} , year={2001} , address={CA} National Institute of Standards and Technology } @book{b2, , title={{An Architecture for Intrusion Detection Using Autonomous}} , author={{ JSBalasubramaniyan } and { JOGarcia-Fernandez } and { DIsacoff } and { ESpafford } and { DZamboni }} , year={1998} Purdue University , note={Paper, COAST Technical Report} } @book{b3, , title={{Utilizing Neural Networks For Effective Intrusion Detection}} , author={{ MBotha } and { RVSolms }} , year={2004} , address={Port Elizabeth Technikon, South Africa} } @book{b4, , title={{An Intrusion Detection Model}} , author={{ DEDenning }} , year={1987} } @book{b5, , title={{Evolving Fuzzy Classifiers for Intrusion Detection}} , author={{ JGomez } and { DDasgupta }} , year={2002} , publisher={IEEE} } @book{b6, , title={{FAQ: Network Intrusion Detection Systems}} , author={{ RGraham }} , year={2000. January 07} , note={Retrieved from www.robertgraham.com} } @incollection{b7, , title={{Current Studies on Intrusion Detection System, Genetic Algorithm And Fuzzy Logic}} , author={{ MMHassan }} , journal={{International Journal of Distributed and Parallel Systems}} , year={2013} } @incollection{b8, , title={{An Implementation of Intrusion Detection System using Genetic Algorithm}} , author={{ MSHoque } and { MMukit } and { MNBikas }} , journal={{International Journal of Network Security & Its Applications}} , year={2012} , note={IJNSA} } @book{b9, , title={{Understanding Intrusion Detection Systems}} , author={{ SInstitute }} , year={2001} , publisher={SANS Institute} } @book{b10, , title={{Intrusion Detection and Prevention Systems}} , author={{ KScarfone } and { PMell }} , year={2007} National Institute of Standards and Technology Special Publication } @incollection{b11, , title={{Intrusion Detection System for Cloud Computing}} , author={{ MKShelke } and { MSontakke } and { DDGawande }} , journal={{International Journal of Scientific & Technology Research}} , year={2012} } @book{b12, , title={{DIDS (Distributed Intrusion Detection System) -Motivation, Architecture, and An Early Prototype}} , author={{ SRSnapp } and { JBrentano } and { GVDias } and { TLGoan } and { LTHeberlein } and { C.-LHo }} , year={2002} , address={Davis} University of California } @book{b13, , title={{}} , author={{ PTillapart } and { TThumthawatworn } and { PSantiprabhob }} , year={2002} , address={Bangkok} Assumption University , note={Fuzzy Intrusion Detection System. Thesis} } @book{b14, , title={{A Stateful Intrusion Detection System forWorld-Wide Web Servers}} , author={{ GVigna } and { WRobertson } and { VKher } and { RAKemmerer }} , year={2002} , address={Santa Barbara} University of California } @book{b15, , title={{Using internal sensors for computer intrusion detection}} , author={{ DZamboni }} , year={2001} Information Assurance and Security, Purdue University }