@incollection{, 4BA95B5EB5ED2049BCA27F04A04E9FAD , author={{Muchelule YusufWanjala} and {Neyole MisikoJacob} and {Jomo Kenyatta University of Agriculture and Technology 1}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1731114 } @book{b0, , title={{Feature deduction and ensemble design of intrusion detection systems}} , author={{ SrilathaChebrolua } and { AjithAbrahama } and { JohnsonPThomasa }} , year={2005} , publisher={ELSEVIER} } @incollection{b1, , title={{A Review of Anomaly based Intrusion Detection Systems}} , author={{ VJyothsna } and { VVRama Prasad } and { KPrasad }} , journal={{International Journal of Computer Applications}} , year={2011} } @incollection{b2, , title={{Anomaly Intrusion Detection System using Information Theory, K-NN and KMC Algorithms}} , author={{ HMShirazi }} , journal={{Australian Journal of Basic and Applied Sciences}} , year={2009} } @incollection{b3, , title={{Anomalous Payloadbased Network Intrusion Detection}} , author={{ Wang } and { S JStolfo }} , booktitle={{7th Symposium on Recent Advances in Intrusion Detection}} , publisher={Springer-Verlag} , year={2004} , note={USA: LNCS} } @incollection{b4, , title={{Importance of Intrusion Detection System}} , author={{ AsmaaShaker IDS } and { Ashoor IDS }} , booktitle={{Prof. Sharad Gore.}} , year={2005} } @incollection{b5, , title={{}} , journal={{International Journal of Scientific Engineering Research}} } @book{b6, , title={{Anomaly-based intrusion detection system}} , year={2016. July 16th. December 20th. 2016} } @book{b7, , title={{Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics}} , author={{ MarkHandley } and { VernPaxson } and { ChristianKreibich }} , year={2001} } @book{b8, , title={{CA 94704 USA: International Computer Science Institute}} , author={{ Berkeley }} } @book{b9, , title={{IDFAQ: How to Evaluate Network Intrusion Detection Systems? Retrieved from SANS Technology Institute}} , author={{ MWilkison }} , year={2002. June 10th} } @incollection{b10, , title={{Evaluating Performance of Intrusion Detection System using Support Vector Machines}} , author={{ LeilaMohammadpour } and { MehdiHussain }} , journal={{Review. International Journal of Security and Its Applications}} , year={2015} , note={Alihossein Aryanfar, Vahid Maleki Raee and Fahad Sattar} } @incollection{b11, , title={{A novel hybrid KPCA and SVM with GA model for intrusion detection}} , author={{ FKuang } and { WXu } and { SZhang }} , journal={{Applied Soft Computing}} , year={2014} } @book{b12, , author={{ NssThe } and { Group }} , title={{Intrusion Detection Systems Group Test}} , year={2001. March 23rd} NSS Group } @book{b13, , title={{Experiences Benchmarking Intrusions Detection Systems}} , author={{ MJRanum }} , year={2001} , publisher={NFR Security Technical Publications} , address={New York City, USA} } @book{b14, , title={{Using Rule-Based Activity Descriptions to Evaluate Intrusion Detection Systems}} , author={{ DAlessandri }} RAID 2001 , year={2001} } @book{b15, , author={{ Icsa }} , title={{Intrusion Detection Systems. Japan: Information Technology Promotion Agency}} , year={2000} }