@incollection{, CD4382D1F684AE93F15ED2B79967A891 , author={{DR. MadjidKhalilian} and {NorwatiMustapha} and {university putra malaysia}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1152934 } @incollection{b0, , title={{A novel unsupervised classification approach for network anomaly detection by k-Means clustering and ID3 decision tree learning methods}} , author={{ YYasami } and { SPMozaffari }} , journal={{The Journal of Supercomputing}} 53 , year={2010} } @book{b1, , title={{Data mining for security applications}} , author={{ BThuraisingham } and { LKhan } and { MMMasud } and { KWHamlen }} , year={2009} } @incollection{b2, , title={{Data mining-based intrusion detectors}} , author={{ SYWu } and { EYen }} , journal={{Expert Systems with Applications}} 36 , year={2009} } @book{b3, , title={{Using Data Field to Analyze Network Intrusions}} , author={{ FXie } and { SBai }} , year={2006} , note={Information Security Practice and Experience} } @incollection{b4, , title={{A clustering-based method for unsupervised intrusion detections}} , author={{ SYJiang } and { XSong } and { HWang } and { JJHan } and { QHLi }} , journal={{Pattern Recognition Letters}} 27 , year={2006} } @book{b5, , title={{A data mining framework for building intrusion detection models}} , author={{ WLee } and { SJStolfo } and { KWMok }} , year={2002} } @book{b6, , title={{A Weighted Support Vector Clustering Algorithm and its Application in Network Intrusion Detection}} , author={{ SSun } and { YZWang }} , year={2009} } @book{b7, , title={{A fast outlier detection strategy for distributed high-Global Journal of Computer Science and Technology Volume XI Issue V Version}} , author={{ MKoufakou } and { Georgiopoulos }} , year={April 2011} } @incollection{b8, , title={{US) dimensional data sets with mixed attributes}} , journal={{Data Mining and Knowledge Discovery}} 20 , year={2010} , note={©2011 Global Journals Inc.} } @book{b9, , title={{A Parallel Clustering Ensemble Algorithm for Intrusion Detection System}} , author={{ HGao } and { DZhu } and { XWang }} , year={2010} } @book{b10, , title={{A swarm intelligence based clustering approach for outlier detection}} , author={{ SAlam } and { GDobbie } and { PRiddle } and { MANaeem }} , year={2010} } @book{b11, , title={{An Adaptive Anomaly Detection Based on Hierarchical Clustering}} , author={{ HLiang } and { RWei-Wu } and { RFei }} , year={2009} } @incollection{b12, , title={{Anomaly Detection Analysis of Intrusion Data using Supervised & Unsupervised Approach}} , author={{ PGogoi } and { BBorah } and { DKBhattacharyya }} , journal={{Journal of Convergence Information Technology}} 5 , year={2010} } @incollection{b13, , title={{Mining Common Outliers for Intrusion Detection}} , author={{ GSingh } and { FMasseglia } and { CFiot } and { AMarascu } and { PPoncelet }} , booktitle={{Advances in Knowledge Discovery and Management}} , year={2010} } @book{b14, , title={{A Mixed Unsupervised Clustering-Based Intrusion Detection Model}} , author={{ GZhang } and { SZhang } and { Sun }} , year={2009} } @book{b15, , title={{Incremental intrusion detecting method based on SOM/RBF}} , author={{ LYTian } and { WPLiu }} , year={2010} } @book{b16, , title={{Network intrusion detection based on hybrid Fuzzy Cmean clustering}} , author={{ HWang } and { YZhang } and { DLi }} , year={2010} } @incollection{b17, , title={{A Cooperative Network Intrusion detection Based on Fuzzy SVMs}} , author={{ STeng } and { HDu } and { NWu } and { WZhang } and { JSu }} , journal={{Journal of Networks}} 5 475 , year={2010} }